CN114358799B - Hardware information management method and device, electronic equipment and storage medium - Google Patents

Hardware information management method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114358799B
CN114358799B CN202111600380.9A CN202111600380A CN114358799B CN 114358799 B CN114358799 B CN 114358799B CN 202111600380 A CN202111600380 A CN 202111600380A CN 114358799 B CN114358799 B CN 114358799B
Authority
CN
China
Prior art keywords
list
product
determining
authentication
reported
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111600380.9A
Other languages
Chinese (zh)
Other versions
CN114358799A (en
Inventor
刘相颖
胡夕伦
潘安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202111600380.9A priority Critical patent/CN114358799B/en
Publication of CN114358799A publication Critical patent/CN114358799A/en
Application granted granted Critical
Publication of CN114358799B publication Critical patent/CN114358799B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The application provides a method for acquiring a current authentication demand list and corresponding current authenticated information of a product; determining a reported key part list of the product according to the current evidence obtaining information; determining a keyword difference list according to a comparison result between the reported keyword list and a preset keyword list; determining a key piece list to be reported according to the key piece difference list; and updating the authentication requirement list according to the key part list to be reported. According to the method provided by the scheme, the key piece list to be reported is detected for the current authentication requirement list, so that a hardware authentication engineer is helped to timely master the hardware authentication progress of the product, and the authentication requirement list of the product is updated pertinently according to the key piece list to be reported, so that the hardware authentication efficiency of the product is improved.

Description

Hardware information management method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of product authentication technologies, and in particular, to a method and apparatus for managing hardware information, an electronic device, and a storage medium.
Background
The hardware authentication service of the server and other products is crucial in trade transaction, and the products can meet the service requirements of clearance, sales and the like only through mandatory authentication in corresponding areas and qualification certificate acquisition, and provide satisfactory and qualified products for consumers.
In the prior art, hardware certification information for a product is typically manually checked by a hardware certification engineer. However, at present, the mandatory authentication types of products are various, and in order to ensure the compliance of the hardware authentication of the products, the products are required to be maintained continuously and key parts are required to be reported, so that a hardware authentication engineer cannot systematically master the progress of the hardware authentication of the products, and the efficiency of the hardware authentication of the products cannot be ensured.
Disclosure of Invention
The application provides a hardware information management method, a device, electronic equipment and a storage medium, which are used for solving the defects that the prior art cannot ensure the efficiency of product hardware authentication and the like.
A first aspect of the present application provides a hardware information management method, including:
acquiring a current authentication demand list and corresponding current authenticated information of a product;
determining a reported key piece list of the product according to the current evidence obtaining information;
determining a keyword difference list according to a comparison result between the reported keyword list and a preset keyword list;
determining a key piece list to be reported according to the key piece difference list;
and updating the authentication demand list according to the key part list to be reported.
Optionally, the determining the to-be-reported key piece list according to the key piece difference list includes:
determining a key part report and backup list according to the key part report and backup requirements represented by the current authentication requirement list;
and determining the keyword list to be reported according to the keyword report list and the keyword difference list.
Optionally, the determining the list of the prepared key parts of the product according to the current certification information includes:
determining an obtained certificate of the product according to the current certification information;
extracting a certificate report of each acquired certificate from a preset certificate library;
and determining a list of the reported key parts of the product according to the key part management information recorded in each certificate report.
Optionally, the obtaining the current authentication requirement list and the corresponding current authenticated information of the product includes:
determining the current authentication demand list according to the product model of the product and a preset product authentication schedule;
and determining the current certification obtaining information corresponding to the certification requirement list according to the certification requirement list and the certification certificates prestored in the current certification library.
Optionally, the method further comprises:
determining an acquired certificate and a certificate to be acquired of the product according to the authentication demand list of the product and corresponding current acquired certificate information;
and calculating the certificate authentication cost generated by the acquired certificate and the certificate to be acquired of the product according to a preset certificate authentication charging standard.
Optionally, the method further comprises:
determining the authentication time of each acquired certificate of the product according to the current acquired certificate information;
and generating a hardware information management report of the product according to the current certification information, the certification time of each obtained certificate and the key piece list to be reported.
Optionally, before determining the keyword differential list according to the comparison result between the reported keyword list and the preset keyword list, the method further includes:
and extracting the key piece list from a part list planned in the initial stage of product development or a comprehensive BOM table planned in the final stage of product development.
A second aspect of the present application provides a hardware information management apparatus, including:
the acquisition module is used for acquiring a current authentication demand list of the product and corresponding current authenticated information;
the first determining module is used for determining a reported key piece list of the product according to the current evidence obtaining information;
the second determining module is used for determining a keyword difference list according to a comparison result between the reported keyword list and a preset keyword list;
the management module is used for determining a key piece list to be reported according to the key piece difference list;
and the updating module is used for updating the authentication requirement list according to the key part list to be reported.
Optionally, the management module is specifically configured to:
determining a key part report and backup list according to the key part report and backup requirements represented by the current authentication requirement list;
and determining the keyword list to be reported according to the keyword report list and the keyword difference list.
Optionally, the first determining module is specifically configured to:
determining an obtained certificate of the product according to the current certification information;
extracting a certificate report of each acquired certificate from a preset certificate library;
and determining a list of the reported key parts of the product according to the key part management information recorded in each certificate report.
Optionally, the acquiring module is specifically configured to:
determining the current authentication demand list according to the product model of the product and a preset product authentication schedule;
and determining the current certification obtaining information corresponding to the certification requirement list according to the certification requirement list and the certification certificates prestored in the current certification library.
Optionally, the apparatus further includes:
the expense management module is used for determining an acquired certificate and a to-be-acquired certificate of the product according to the authentication demand list of the product and corresponding current acquired certificate information; and calculating the certificate authentication cost generated by the acquired certificate and the certificate to be acquired of the product according to a preset certificate authentication charging standard.
Optionally, the apparatus further includes:
the report generation module is used for determining the authentication time of each acquired certificate of the product according to the current acquired certificate information; and generating a hardware information management report of the product according to the current certification information, the certification time of each obtained certificate and the key piece list to be reported.
Optionally, the second determining module is further configured to:
and extracting the key piece list from a part list planned in the initial stage of product development or a comprehensive BOM table planned in the final stage of product development.
A third aspect of the present application provides an electronic device, including: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executes the computer-executable instructions stored by the memory such that the at least one processor performs the method as described above in the first aspect and the various possible designs of the first aspect.
A fourth aspect of the present application provides a computer-readable storage medium having stored therein computer-executable instructions which, when executed by a processor, implement the method as described above in the first aspect and the various possible designs of the first aspect.
The technical scheme of the application has the following advantages:
the application provides a hardware information management method, a device, electronic equipment and a storage medium, wherein the method comprises the following steps: acquiring a current authentication demand list and corresponding current authenticated information of a product; determining a reported key part list of the product according to the current evidence obtaining information; determining a keyword difference list according to a comparison result between the reported keyword list and a preset keyword list; determining a key piece list to be reported according to the key piece difference list; and updating the authentication requirement list according to the key part list to be reported. According to the method provided by the scheme, the key piece list to be reported is detected for the current authentication requirement list, so that a hardware authentication engineer is helped to timely master the hardware authentication progress of the product, and the authentication requirement list of the product is updated pertinently according to the key piece list to be reported, so that the hardware authentication efficiency of the product is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, a brief description will be given below of the drawings required for the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings for a person having ordinary skill in the art.
FIG. 1 is a schematic diagram of a hardware information management system according to an embodiment of the present application;
fig. 2 is a flow chart of a hardware information management method according to an embodiment of the present application;
fig. 3 is an overall flow diagram of a hardware information management method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a hardware information management device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Specific embodiments thereof have been shown by way of example in the drawings and will herein be described in more detail. These drawings and the written description are not intended to limit the scope of the disclosed concepts in any way, but to illustrate the concepts of the present application to those skilled in the art with reference to the specific embodiments.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. In the following description of the embodiments, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
In the prior art, a hardware authentication engineer usually manually inspects hardware authentication information of a product, and the manual inspection method has the problems of complicated steps, inconvenient operation, time consumption, labor consumption, low accuracy and low efficiency. In addition, the existing mandatory authentication types of products are various, and in order to ensure the compliance of the hardware authentication of the products, the products are required to be maintained continuously and key parts are required to be reported, so that a hardware authentication engineer cannot systematically master the progress of the hardware authentication of the products, and the efficiency of the hardware authentication of the products cannot be ensured.
Aiming at the problems, the hardware information management method, the device, the electronic equipment and the storage medium provided by the embodiment of the application acquire the current authentication requirement list and the corresponding current authenticated information of the product; determining a reported key part list of the product according to the current evidence obtaining information; determining a keyword difference list according to a comparison result between the reported keyword list and a preset keyword list; determining a key piece list to be reported according to the key piece difference list; and updating the authentication requirement list according to the key part list to be reported. The key part list to be reported is detected for the current authentication requirement list, so that a hardware authentication engineer is helped to timely master the hardware authentication progress of the product, and the authentication requirement list of the product is updated pertinently according to the key part list to be reported, so that the hardware authentication efficiency of the product is improved.
The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
First, a configuration of a hardware information management system according to the present application will be described:
the hardware information management method, the device, the electronic equipment and the storage medium are suitable for managing the hardware authentication information of the product in the product research and development process. Fig. 1 is a schematic structural diagram of a hardware information management system according to an embodiment of the present application, which mainly includes a product information base, a data acquisition device, and a hardware information management device for managing hardware information of a product. Specifically, the data acquisition device is used for acquiring an authentication demand list of a product to be managed and corresponding current evidence obtaining information in the product information base, and transmitting the acquired data to the hardware information management device. The device determines a key part list to be reported of the product according to the received big information, and updates an authentication requirement list for the product while sending the key part list to be reported to a product information base.
The embodiment of the application provides a hardware information management method which is used for managing hardware authentication information of a product in the product research and development process. The execution body of the embodiment of the application is an electronic device, such as a server, a desktop computer, a notebook computer, a tablet computer and other electronic devices which can be used for managing product hardware information.
As shown in fig. 2, a flow chart of a hardware information management method according to an embodiment of the present application is shown, where the method includes:
step 201, a current authentication requirement list and corresponding current authenticated information of a product are obtained.
The certification requirement list can be set by a hardware certification engineer according to actual requirements of products, and can be automatically generated according to the types of the products.
Specifically, a corresponding display plate can be activated according to the product model number and the authentication type in the authentication requirement list, the display plate represents the authentication type required by the product, and each authentication type comprises a plurality of authentication certificates with different versions. And then determining the current certification information of the product according to the certification certificate corresponding to the activated display plate in the certificate library of the current product.
Step 202, determining a list of reported key parts of the product according to the current authenticated information.
It should be noted that, the certificate library is located in a file management system (PLM), and the certificate library stores a certificate report of the certificate while storing the certificate, where the certificate report includes various keys controlled by the certificate.
Specifically, in one embodiment, the obtained certificate of the product may be determined based on the current certification information; extracting a certificate report of each acquired certificate from a preset certificate library; and determining a list of the key parts which are reported and prepared for the product according to the key part management information recorded in each certificate report.
Specifically, the obtained certificate of the product can be positioned from the certificate library according to the current obtained certificate information, the corresponding certificate report is extracted, the controlled information of the key piece corresponding to each obtained certificate is determined by analyzing the certificate report of each obtained certificate, the controlled key piece is determined to be the prepared key piece, and the prepared key piece corresponding to each obtained certificate is combined to generate the prepared key piece list of the product.
Step 203, determining a keyword difference list according to the comparison result between the reported keyword list and the preset keyword list.
The key piece list is a key piece and a corresponding model of a planned deployment of a research and development personnel in the product research and development process. The key piece list can be extracted from a part list planned in the initial stage of product research and development or a comprehensive BOM table planned in the final stage of product research and development. When the product is an electronic device such as a server, the key components may include components such as a fan, a power module, a motherboard, a CPU, and a GPU.
Specifically, the comparison result between the reported keyword list and the preset keyword list determines the difference keywords of the current reported keyword relative to the research and development plan, and the difference keywords are summarized into a keyword difference list. The differences of the key parts are mainly expressed in the aspects of model numbers, key part types and the like.
Step 204, determining a list of key components to be reported according to the key component difference list.
Specifically, the defect of the product in the aspect of the report of the key piece can be analyzed according to the currently obtained key piece difference list, so that the corresponding key piece list to be reported is determined.
Specifically, in an embodiment, the key part report list may be determined according to the key part report requirement represented by the current authentication requirement list; and determining a keyword list to be reported according to the keyword report list and the keyword difference list.
It should be noted that, the critical part reporting requirement is determined according to the certificate authentication requirement at the certificate authentication level, and the critical part list is determined according to the product hardware deployment requirement at the product development level, so that a certain difference exists between the critical part reporting requirement and the critical part list. However, in the actual hardware authentication process, the key part reporting and backup result of the product should meet the key part reporting and backup requirement and the key part list at the same time.
Specifically, the operation of merging the keyword report list and the keyword difference list can be performed to obtain a to-be-reported keyword list which can simultaneously meet the requirement of the keyword report and the keyword list.
Step 204, updating the authentication requirement list according to the key part list to be reported.
Specifically, the authentication requirement list can be updated in a targeted manner according to the current critical part reporting requirement represented by the critical part to be reported, so as to meet the current critical part reporting requirement.
On the basis of the above embodiment, the authentication certificates stored in the certificate library are all authentication certificates obtained by one electronic equipment manufacturer, and as one implementation manner, in one embodiment, the step of obtaining the current authentication requirement list and corresponding current authenticated information of the product includes:
step 2011, determining a current authentication demand list according to the product model of the product and a preset product authentication schedule;
step 2012, determining current certification obtaining information corresponding to the certification requirement list according to the certification requirement list and the certification certificates prestored in the current certification library.
The product authentication schedule records authentication certificates which need to be acquired when the product enters the market of each area.
Specifically, in one embodiment, the current certification information may be a certification code of the product, e.g., ABCDEFGHIJK. The character "#" is a variable representing the product model; the character' is constant, and the product model and the authenticated code are divided. A represents CCC authentication, a=1 if the product has CCC credentials, a=0 if the product does not have CCC credentials; b represents energy saving authentication, if there is b=1, if there is no, b=0; c represents environment authentication, if there is, c=1, if there is no, c=0; d represents CB authentication, if any, d=1, if not, d=0; e represents CE-LVD authentication, if yes, e=1, if no, e=0; f represents CE-EMC authentication, if present, f=1, if not present, f=0; g represents FCC authentication, if any, f=1, if not, f=0; h represents UL authentication, g=1 if any, g=0 if no; i represents KC authentication, if there is h=1, if there is no, h=0; j represents energy efficiency authentication, if yes, i=1, if no, i=0; k represents EAC authentication, if yes, j=1, if no, j=0; l represents information security authentication, if yes, k=1, if no, k=0; m represents BSMI authentication, if yes, l=1, if no, l=0; if a product has CCC, CB, CE-LVD, CE-EMC, FCC, and UL certificates, then it is certified as 1001111100000.
Accordingly, in an embodiment, for the reported keyword list, the report content of the authentication certificate may be scanned and read, the keyword may be searched, and the keyword list information in different types of reports may be directionally acquired, for example: the system comprises a fan, a power module, a main board, a CPU, a GPU and other model information. The intelligently read information is uniformly stored in the following reported key list codes, and the names of the reported key list of the product are as follows: abcdefghijkl. Wherein, the character "#" is a variable and represents the product model; the character' is constant, and the product model and the authenticated key part list are divided. a. b, c, d, e, f, g, h, i, j, k, l represent key inventory information in CCC, energy saving, environment, CB, CE-LVD, CE-EMC, FCC, UL, KC, energy efficiency, EAC, information security, BSMI authentication report, respectively.
Further, keyword list-prepared keyword list (#: abcdefghijkl) =keyword differential list (#: a 'b' c'd' e 'f' g 'h' i 'j' k 'l'). Keyword differential list (#: a 'b' c'd' e 'f' g 'h' i 'j' k 'l') u keyword stock requirement = stock keyword list (#: a "b" c "d" e "f" g "h" i "j" k "l").
Further, in an embodiment, in order to further enrich the hardware information management function, the obtained certificate and the to-be-obtained certificate of the product may be determined according to the authentication requirement list of the product and the corresponding current authenticated information; and calculating the certificate authentication cost generated by the acquired certificate and the to-be-acquired certificate of the product according to the preset certificate authentication charging standard.
Specifically, the quotation (certificate authentication charging standard) can be uploaded to the certificate authentication expense module to automatically classify according to the product model and authentication category on the quotation, calculate and generate a total expense list for project expense statistics.
Further, in an embodiment, the authentication time of each obtained certificate of the product may be determined according to the current obtained certificate information; and generating a hardware information management report of the product according to the current certification information, the certification time of each obtained certificate and the key part list to be reported.
Specifically, the generated hardware information management report may further include a certificate authentication fee of the acquired certificate and a certificate authentication fee of the certificate to be acquired.
Specifically, the hardware information management report can be pushed to a hardware authentication management department to help related technicians such as a hardware authentication engineer to manage and control the product hardware authentication progress.
Exemplary, as shown in fig. 3, an overall flow chart of the hardware information management method provided in the embodiment of the present application is shown. The information display plate may be an information display device of a hardware authentication management department, and may display an unreported key part list (to-be-reported key part list), a hardware information management report, and the like. The method shown in fig. 3 is an exemplary implementation of the method shown in fig. 2, and the two implementation principles are the same, and will not be described again.
According to the hardware information management method provided by the embodiment of the application, the current authentication demand list and the corresponding current authenticated information of the product are obtained; determining a reported key part list of the product according to the current evidence obtaining information; determining a keyword difference list according to a comparison result between the reported keyword list and a preset keyword list; determining a key piece list to be reported according to the key piece difference list; and updating the authentication requirement list according to the key part list to be reported. According to the method provided by the scheme, the key piece list to be reported is detected for the current authentication requirement list, so that a hardware authentication engineer is helped to timely master the hardware authentication progress of the product, and the authentication requirement list of the product is updated pertinently according to the key piece list to be reported, so that the hardware authentication efficiency of the product is improved. In addition, the method is convenient for hardware authentication engineers to know the conditions of evidence collection, key part report and cost and the like of each product in real time, not only reduces the time for manually sorting data, but also improves the working efficiency and accuracy, realizes standardization, rapidness, systemization and visual presentation of hardware authentication service information, and is quite convenient for hardware authentication management work.
The embodiment of the application provides a hardware information management device for executing the hardware information management method provided by the embodiment.
Fig. 4 is a schematic structural diagram of a hardware information management device according to an embodiment of the present application. The hardware information management device 40 includes: an acquisition module 401, a first determination module 402, a second determination module 403, a management module 404, and an update module 405.
The acquisition module is used for acquiring a current authentication demand list of the product and corresponding current evidence obtaining information; the first determining module is used for determining a reported key piece list of the product according to the current evidence obtaining information; the second determining module is used for determining a keyword difference list according to a comparison result between the reported keyword list and a preset keyword list; the management module is used for determining a to-be-reported key piece list according to the key piece difference list; and the updating module is used for updating the authentication requirement list according to the key part list to be reported.
Specifically, in an embodiment, the management module is specifically configured to:
determining a keyword report and backup list according to the keyword report and backup requirements represented by the current authentication requirement list;
and determining a keyword list to be reported according to the keyword report list and the keyword difference list.
Specifically, in an embodiment, the first determining module is specifically configured to:
determining an obtained certificate of the product according to the current certificate information;
extracting a certificate report of each acquired certificate from a preset certificate library;
and determining a list of the key parts which are reported and prepared for the product according to the key part management information recorded in each certificate report.
Specifically, in an embodiment, the obtaining module is specifically configured to:
determining a current authentication demand list according to the product model of the product and a preset product authentication schedule;
and determining the current evidence obtaining information corresponding to the authentication demand list according to the authentication demand list and authentication certificates prestored in the current evidence library.
Specifically, in an embodiment, the apparatus further comprises:
the expense management module is used for determining an acquired certificate and a certificate to be acquired of the product according to the authentication demand list of the product and corresponding current acquired certificate information; and calculating the certificate authentication cost generated by the acquired certificate and the to-be-acquired certificate of the product according to the preset certificate authentication charging standard.
Specifically, in an embodiment, the apparatus further comprises:
the report generation module is used for determining the authentication time of each acquired certificate of the product according to the current acquired certificate information; and generating a hardware information management report of the product according to the current certification information, the certification time of each obtained certificate and the key part list to be reported.
Specifically, in an embodiment, the second determining module is further configured to:
and extracting a key part list from a part list planned in the initial stage of product development or a comprehensive BOM table planned in the final stage of product development.
With respect to the hardware information management apparatus in the present embodiment, the specific manner in which the respective modules perform operations has been described in detail in the embodiment regarding the method, and will not be described in detail here.
The hardware information management device provided in the embodiment of the present application is configured to execute the hardware information management method provided in the foregoing embodiment, and its implementation manner is the same as the principle, and is not repeated.
The embodiment of the application provides an electronic device for executing the hardware information management method provided by the embodiment.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application. The electronic device 50 includes: at least one processor 51 and a memory 52;
the memory stores computer-executable instructions; at least one processor executes computer-executable instructions stored in the memory, causing the at least one processor to perform the hardware information management method as provided by the above embodiments.
The implementation manner and principle of the electronic device provided in the embodiment of the present application are the same, and are not repeated.
The embodiment of the application provides a computer readable storage medium, in which computer executable instructions are stored, and when a processor executes the computer executable instructions, the hardware information management method provided in any embodiment above is implemented.
The storage medium including the computer executable instructions in the embodiments of the present application may be used to store the computer executable instructions of the hardware information management method provided in the foregoing embodiments, and the implementation manner and principle of the implementation are the same, and are not repeated.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in hardware plus software functional units.
The integrated units implemented in the form of software functional units described above may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium, and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to perform part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional modules is illustrated, and in practical application, the above-described functional allocation may be performed by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to perform all or part of the functions described above. The specific working process of the above-described device may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present application.

Claims (9)

1. A hardware information management method, comprising:
acquiring a current authentication demand list and corresponding current authenticated information of a product;
determining a reported key piece list of the product according to the current evidence obtaining information;
determining a keyword difference list according to a comparison result between the reported keyword list and a preset keyword list;
determining a key piece list to be reported according to the key piece difference list;
updating the authentication demand list according to the key part list to be reported;
and determining a to-be-reported key piece list according to the key piece difference list, wherein the method comprises the following steps:
determining a key part report and backup list according to the key part report and backup requirements represented by the current authentication requirement list;
and determining the keyword list to be reported according to the keyword report list and the keyword difference list.
2. The method of claim 1, wherein the determining the list of reported key pieces for the product based on the current certified information comprises:
determining an obtained certificate of the product according to the current certification information;
extracting a certificate report of each acquired certificate from a preset certificate library;
and determining a list of the reported key parts of the product according to the key part management information recorded in each certificate report.
3. The method of claim 1, wherein the obtaining the current certification requirement list and corresponding current certification information for the product comprises:
determining the current authentication demand list according to the product model of the product and a preset product authentication schedule;
and determining the current certification obtaining information corresponding to the certification requirement list according to the certification requirement list and the certification certificates prestored in the current certification library.
4. The method as recited in claim 1, further comprising:
determining an acquired certificate and a certificate to be acquired of the product according to the authentication demand list of the product and corresponding current acquired certificate information;
and calculating the certificate authentication cost generated by the acquired certificate and the certificate to be acquired of the product according to a preset certificate authentication charging standard.
5. The method as recited in claim 1, further comprising:
determining the authentication time of each acquired certificate of the product according to the current acquired certificate information;
and generating a hardware information management report of the product according to the current certification information, the certification time of each obtained certificate and the key piece list to be reported.
6. The method of claim 1, wherein prior to determining a list of key differences based on a comparison between the list of reported keys and a list of preset keys, the method further comprises:
and extracting the key piece list from a part list planned in the initial stage of product development or a comprehensive BOM table planned in the final stage of product development.
7. A hardware information management apparatus, comprising:
the acquisition module is used for acquiring a current authentication demand list of the product and corresponding current authenticated information;
the first determining module is used for determining a reported key piece list of the product according to the current evidence obtaining information;
the second determining module is used for determining a keyword difference list according to a comparison result between the reported keyword list and a preset keyword list;
the management module is used for determining a key piece list to be reported according to the key piece difference list;
the updating module is used for updating the authentication requirement list according to the key part list to be reported;
the management module is specifically configured to:
determining a key part report and backup list according to the key part report and backup requirements represented by the current authentication requirement list;
and determining the keyword list to be reported according to the keyword report list and the keyword difference list.
8. An electronic device, comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing computer-executable instructions stored in the memory causes the at least one processor to perform the method of any one of claims 1 to 6.
9. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor implement the method of any of claims 1 to 6.
CN202111600380.9A 2021-12-24 2021-12-24 Hardware information management method and device, electronic equipment and storage medium Active CN114358799B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111600380.9A CN114358799B (en) 2021-12-24 2021-12-24 Hardware information management method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111600380.9A CN114358799B (en) 2021-12-24 2021-12-24 Hardware information management method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114358799A CN114358799A (en) 2022-04-15
CN114358799B true CN114358799B (en) 2024-01-19

Family

ID=81101653

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111600380.9A Active CN114358799B (en) 2021-12-24 2021-12-24 Hardware information management method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114358799B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115062924B (en) * 2022-05-27 2024-01-12 苏州浪潮智能科技有限公司 Authentication sample feeding piece management and control method, system and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109377055A (en) * 2018-10-25 2019-02-22 金蝶软件(中国)有限公司 A kind of method and device of business paper adjustment
CN112116288A (en) * 2020-08-21 2020-12-22 苏州浪潮智能科技有限公司 Method, system, equipment and medium for ensuring consistency of key parts
CN112632937A (en) * 2020-12-30 2021-04-09 远光软件股份有限公司 Scrap list generation method and device, storage medium and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109377055A (en) * 2018-10-25 2019-02-22 金蝶软件(中国)有限公司 A kind of method and device of business paper adjustment
CN112116288A (en) * 2020-08-21 2020-12-22 苏州浪潮智能科技有限公司 Method, system, equipment and medium for ensuring consistency of key parts
CN112632937A (en) * 2020-12-30 2021-04-09 远光软件股份有限公司 Scrap list generation method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN114358799A (en) 2022-04-15

Similar Documents

Publication Publication Date Title
JP5984149B2 (en) Apparatus and method for updating software
CN109919781A (en) Case recognition methods, electronic device and computer readable storage medium are cheated by clique
CN113157489B (en) Database data backup method and device and computer equipment
CN111383130A (en) Full life cycle management and control platform, mobile operation and maintenance client and terminal
CN114358799B (en) Hardware information management method and device, electronic equipment and storage medium
CN114880405A (en) Data lake-based data processing method and system
CN111831628A (en) System operation and maintenance monitoring method and device, electronic equipment and storage medium
CN114840531A (en) Data model reconstruction method, device, equipment and medium based on blood relationship
CN109240916A (en) Information output controlling method, device and computer readable storage medium
CN111198902A (en) Metadata management method and device, storage medium and electronic equipment
CN112668314A (en) Data standard conformance detection method, device, system and storage medium
CN115880116A (en) Task scheduling method, system, readable storage medium and computer equipment
CN113254446B (en) Data fusion method, device, electronic equipment and medium
JP2012014308A (en) Method and device for predicting influence of change
CN114911511A (en) Software technology state management system
CN110348984B (en) Automatic credit card data input method and related equipment under different transaction channels
CN112948131A (en) Data acquisition method and equipment
CN109325063B (en) Data management method and device
CN111859985A (en) AI customer service model testing method, device, electronic equipment and storage medium
CN117194382A (en) Middle-stage data processing method and device, electronic equipment and storage medium
JPH11249944A (en) Method and device for data cooperation and storage medium
CN113313427B (en) Data demand analysis method, system and storage medium
CN117785860A (en) Household appliance manufacturing data management method, device, equipment and storage medium
CN111858633A (en) Data record generation and invalidation time generation method, electronic device and readable storage medium
CN110930084A (en) BOM (Bill of Material) management method, system, terminal and storage medium of server based on database

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant