CN115019809A - Method, apparatus, device, medium, and program product for preventing false entry into an interval - Google Patents

Method, apparatus, device, medium, and program product for preventing false entry into an interval Download PDF

Info

Publication number
CN115019809A
CN115019809A CN202210534414.7A CN202210534414A CN115019809A CN 115019809 A CN115019809 A CN 115019809A CN 202210534414 A CN202210534414 A CN 202210534414A CN 115019809 A CN115019809 A CN 115019809A
Authority
CN
China
Prior art keywords
name
operation ticket
read
guardian
identification result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210534414.7A
Other languages
Chinese (zh)
Other versions
CN115019809B (en
Inventor
张卓杰
刘茂涛
张鹏
龙建华
姚言超
王雨晨
麦俊宁
王彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Bureau of Extra High Voltage Power Transmission Co
Original Assignee
Guangzhou Bureau of Extra High Voltage Power Transmission Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Bureau of Extra High Voltage Power Transmission Co filed Critical Guangzhou Bureau of Extra High Voltage Power Transmission Co
Priority to CN202210534414.7A priority Critical patent/CN115019809B/en
Publication of CN115019809A publication Critical patent/CN115019809A/en
Application granted granted Critical
Publication of CN115019809B publication Critical patent/CN115019809B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/04Segmentation; Word boundary detection
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Human Computer Interaction (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)
  • Devices For Checking Fares Or Tickets At Control Points (AREA)

Abstract

The application relates to the field of electric power safety, and provides a method, a device, equipment, a medium and a program product for monitoring an anti-false-entry interval. According to the method and the system, the identity of the power operation personnel can be accurately verified on the premise of not depending on the communication signal state of the server, and the method and the system can be realized only by equipment with a simpler structure and a lower manufacturing cost. The method comprises the following steps: acquiring the name of an operation ticket; receiving the name of an operation ticket read by a guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result; if the first segmentation identification result represents that the operation order name read by the guardian is correct, receiving the operation order name read by the operator, and performing segmentation identification on the operation order name read by the operator and the operation order name to obtain a second segmentation identification result; and determining whether the spaced electronic lock needs to be unlocked or not according to the second segment identification result.

Description

Method, apparatus, device, medium, and program product for preventing false entry into an interval
Technical Field
The present application relates to the field of electrical safety technologies, and in particular, to a method, an apparatus, a device, a medium, and a program product for monitoring a false access prevention interval.
Background
With the development of the technical field of electric power safety, more and more substations select a mode of carrying out multiple times of identity verification on electric power operators entering an interval, so that the occurrence of vicious misoperation accidents such as equipment tripping and system power failure which can cause great hidden dangers to electric power safety production due to the fact that the electric power operators enter the interval by mistake is avoided.
At present, a method based on the combination of Bluetooth and NFC technologies can be adopted to carry out double identity authentication on electric power operators, but the equipment structure required for realizing the method is complex, the manufacturing cost is high, and the accuracy of the identity authentication of the electric power operators by using the method is high and depends on the communication signal state of a server.
Disclosure of Invention
In view of the above, it is necessary to provide a method, an apparatus, a device, a medium, and a program product for monitoring a false entry prevention interval.
In a first aspect, the application provides a method for monitoring a false access prevention interval. The method comprises the following steps:
acquiring the name of an operation ticket;
receiving the name of an operation ticket read by a guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result;
if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result;
and determining whether the spaced electronic lock needs to be unlocked or not according to the second segment identification result.
In a second aspect, the present application further provides a device for monitoring false access prevention intervals. The device comprises:
the information acquisition module is used for acquiring the name of the operation ticket;
the first identification module is used for receiving the name of the operation ticket read by the guardian, and performing segmented identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first segmented identification result;
the second identification module is used for receiving the operation ticket name read by the operator if the first sectional identification result represents that the operation ticket name read by the guardian is correct, and performing sectional identification on the operation ticket name read by the operator and the operation ticket name to obtain a second sectional identification result;
and the result judgment module is used for determining whether the spaced electronic lock needs to be unlocked according to the second segment identification result.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory storing a computer program and a processor implementing the following steps when executing the computer program:
acquiring the name of an operation ticket; receiving the name of an operation ticket read by a guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result; if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result; and determining whether the spaced electronic lock needs to be unlocked or not according to the second segment identification result.
In a fourth aspect, the present application further provides a computer-readable storage medium. The computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring the name of an operation ticket; receiving the name of an operation ticket read by a guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result; if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result; and determining whether the spaced electronic lock needs to be unlocked or not according to the second segment identification result.
In a fifth aspect, the present application further provides a computer program product. The computer program product comprising a computer program which when executed by a processor performs the steps of:
acquiring the name of an operation ticket; receiving the name of an operation ticket read by a guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result; if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result; and determining whether the spaced electronic lock needs to be unlocked or not according to the second segment identification result.
The method, the device, the equipment, the medium and the program product for monitoring the anti-false-entry interval firstly acquire the name of the operation ticket. And then, receiving the name of the operation ticket read by the guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result. And then, if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result. And finally, determining whether the spaced electronic lock needs to be unlocked according to the second segment identification result. This scheme passes through the mode of pronunciation segmentation discernment, discerns the operation ticket name of reading aloud to guardian and operation person respectively and verifies, not only can do not rely on under the prerequisite of the communication signal state of server, accurately carry out authentication to the electric power operation personnel, and only need can realize through the equipment that the structure is comparatively simple, the manufacturing cost is lower.
Drawings
FIG. 1 is a schematic flow chart of a method for monitoring an anti-false-entry interval according to an embodiment;
FIG. 2 is a flow diagram illustrating an embodiment of segmented speech recognition in one embodiment;
FIG. 3 is a flow diagram illustrating the manner in which subsequent monitoring processes are performed based on the first segmented identification result in one embodiment;
FIG. 4 is a flow diagram illustrating the manner in which a monitoring device may be switched from a sleep state to an active state in one embodiment;
FIG. 5 is a block diagram of an embodiment of a device for monitoring a miss-entry prevention interval;
FIG. 6 is a diagram of the internal structure of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The method for monitoring the false entry prevention interval can be applied to terminal execution. The terminal can be, but is not limited to, various personal computers, notebook computers, tablet computers and internet of things equipment.
In an embodiment, as shown in fig. 1, a method for monitoring an anti-false-entry interval is provided, which is described by taking an example that the method is applied to a terminal, and includes the following steps:
in step S101, the name of the operation ticket is acquired.
In this step, the original information of the operation ticket may be generated by an operator submitting an application for obtaining the operation ticket in an external system; the recording form of the operation ticket can be a paper form; the name of the operation ticket can be acquired on the basis that the original information of the operation ticket is generated. Therefore, in the case where the source of the original information forming the operation ticket and the premise of acquiring the name of the operation ticket are made clear, the name of the operation ticket may be acquired from an external system that has generated the original information of the operation ticket.
And S102, receiving the name of the operation ticket read by the guardian, and performing segmented identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first segmented identification result.
In this step, the device for receiving the name of the operation order read aloud by the guardian can be a single microphone or a double microphone, and when the double microphones are used, the effect of positioning the voice direction can be realized; the name of the operation ticket read by the guardian can be generated by reading the name recorded in the operation ticket by the guardian; performing segmented identification on the name of the operation ticket read by the guardian and the name of the operation ticket, namely correspondingly dividing the received name of the operation ticket read by the guardian and the name of the operation ticket obtained from an external system generating original information of the operation ticket into multiple segments and performing corresponding identification; the first segmentation identification result is obtained by correspondingly identifying the name of the operation ticket read by the guardian which is correspondingly segmented into a plurality of segments and the name of the operation ticket; the means for obtaining the first segment recognition result may be the AI speech recognition module SNR 9816.
And step S103, if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result.
In the step, the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, which means that the name of the operation ticket read by the guardian can be shown to be consistent with the name of the operation ticket obtained from the external system which generates the original information of the operation ticket through the first segmentation identification result; the device for receiving the name of the operation ticket read by the operator can be a single microphone or a double microphone, and when the double microphone is used, the effect of positioning the voice direction can be realized; the operation ticket name read by the operator may be generated by reading the name recorded in the operation ticket by the operator; performing segmented identification on the operation ticket name read by an operator and the name of the operation ticket, namely dividing the received operation ticket name read by the operator into a plurality of segments corresponding to the operation ticket name acquired from an external system generating original information of the operation ticket, and performing corresponding identification; a second segment recognition result, which is a result of recognizing the operation ticket name read by the operator who has been divided into a plurality of segments correspondingly and the name of the operation ticket; the means for obtaining the second segment recognition result may be the AI speech recognition module SNR 9816.
And step S104, determining whether the electronic lock at the interval needs to be unlocked according to the second segment identification result.
In the step, according to the second segment identification result, whether the name of the operation ticket read by the operator is consistent with the name of the operation ticket obtained from the external system generating the original information of the operation ticket is judged according to the second segment identification result; and according to the second section identification result, after the electronic lock at the interval is determined to be opened, the current monitoring process can be ended.
The method for monitoring the anti-false-entry interval comprises the following steps of firstly, obtaining the name of an operation ticket. And then, receiving the name of the operation ticket read by the guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result. And then, if the first segmentation identification result represents that the operation order name read by the guardian is correct, receiving the operation order name read by the operator, and performing segmentation identification on the operation order name read by the operator and the operation order name to obtain a second segmentation identification result. And finally, determining whether the spaced electronic lock needs to be unlocked according to the second segment identification result. This scheme passes through the mode of pronunciation segmentation discernment, discerns the operation ticket name of reading aloud to guardian and operation person respectively and verifies, not only can do not rely on under the prerequisite of the communication signal state of server, accurately carry out authentication to the electric power operation personnel, and only need can realize through the equipment that the structure is comparatively simple, the manufacturing cost is lower.
As for the method of segmenting the operation ticket name according to the preset segmentation method, in an embodiment, the step S102 further includes:
and correspondingly dividing the name of the operation ticket and the name of the operation ticket read by the guardian into a plurality of sections according to a preset segmentation mode. The preset segmentation mode can be determined according to the preset identification fault tolerance rate.
The preset identification fault tolerance rate refers to the rate that the name of an operation ticket read by a guardian is allowed to be inconsistent with the name of an operation ticket acquired from an external system which generates original information of the operation ticket; when the operation ticket names read by the guardian which are correspondingly divided into multiple sections are compared with the operation ticket names, the identification result can be determined to represent that the operation ticket names read by the guardian are wrong as long as the comparison error rate of any section is higher than the preset identification fault-tolerant rate; the preset segmentation mode is determined according to the preset identification fault tolerance rate, namely the length of the character contained in each segment is determined according to the mode that the rate of one error in each segment after segmentation cannot be higher than the preset identification fault tolerance rate.
For example, if the preset recognition fault tolerance is 20%, when the operation ticket name with the total length of 11 characters is segmented, the operation ticket name can be divided into two segments each including 4 characters and one segment including 3 characters. Because the error rate of 1 character in 4 characters is 25%, the error rate of 1 character in 3 characters is 33%, and both 25% and 33% are lower than the preset recognition fault-tolerant rate by 20%, the segmentation mode meets the requirement that the error rate of each segment after segmentation cannot be higher than the preset recognition fault-tolerant rate.
Further, for the embodiment of segmented speech recognition, taking two segments each containing 4 characters and one segment containing 3 characters, which are obtained by splitting the operation ticket name read by the guardian and have a total length of 11 characters, as shown in fig. 2, the method further includes:
step S201, truncating a content with a character length consistent with a first segment obtained by segmenting the name of the operation ticket obtained from the external system of the original information of the generated operation ticket from the received name of the operation ticket read aloud by the guardian, and comparing the truncated content with the first segment obtained by segmenting the name of the operation ticket obtained from the external system of the original information of the generated operation ticket to obtain a first comparison result.
Step S202, if the error rate in the first comparison result is not higher than the preset identification fault-tolerant rate, intercepting the content with the same length as the second section of the character segmented from the name of the operation ticket acquired from the external system of the original information of the generated operation ticket from the rest part of the name of the received operation ticket read aloud by the guardian, and comparing the intercepted content with the second section of the character segmented from the name of the operation ticket acquired from the external system of the original information of the generated operation ticket to obtain a second comparison result.
If the error rate in the first comparison result is higher than the preset identification fault-tolerant rate, ending the current comparison process; if the error rate in the first comparison result is not higher than the preset identification fault-tolerant rate, continuously intercepting the content with the same character length as the second segment of the operation ticket segmented from the name of the operation ticket obtained from the external system which generates the original information of the operation ticket from the rest part of the name of the received operation ticket read by the guardian; the remaining part of the name of the operation ticket read by the guardian is the remaining part of the received operation ticket read by the guardian after the first piece of content is cut out.
Step S203, if the error rate in the second comparison result is not higher than the preset identification fault tolerance rate, truncating a content with a character length consistent with a third segment obtained by segmenting the name of the operation ticket obtained from the external system that has generated the original information of the operation ticket from the remaining part of the name of the operation ticket read aloud by the guardian, and comparing the truncated content with the third segment obtained by segmenting the name of the operation ticket obtained from the external system that has generated the original information of the operation ticket to obtain a third comparison result.
If the error rate in the second comparison result is higher than the preset identification fault-tolerant rate, ending the current comparison process; if the error rate in the second comparison result is not higher than the preset identification fault-tolerant rate, continuously intercepting the content with the same character length as the third section of the operation ticket obtained by the name segmentation of the operation ticket acquired from the external system which generates the original information of the operation ticket from the rest part of the received operation ticket read by the guardian; the remaining part of the name of the operation ticket read by the guardian is the remaining part of the received operation ticket read by the guardian after the contents of the first section and the second section are cut out.
In step S204, if the error rate in the third comparison result is not higher than the preset identification fault-tolerant rate, it indicates that the name of the operation ticket read by the guardian is consistent with the name of the operation ticket obtained from the external system that has generated the original information of the operation ticket, so that the first sectional identification result indicating that the name of the operation ticket read by the guardian is correct can be obtained.
If the error rate in the third comparison result is higher than the preset identification fault-tolerant rate, ending the current comparison process; if the error rate in the third comparison result is not higher than the preset identification fault-tolerant rate, it is indicated that the name of the operation ticket read by the guardian is consistent with the name of the operation ticket obtained from the external system generating the original information of the operation ticket, so that a first subsection identification result representing that the name of the operation ticket read by the guardian is correct can be obtained; after the first segment identification result representing that the name of the operation order read by the guardian is correct is obtained, the step S103 can be continuously executed.
In the above steps S201 to S204, the means for intercepting the content from the name of the operation ticket read by the guardian and comparing the content with the corresponding part of the operation ticket obtained from the external system that has generated the original information of the operation ticket may be an AI voice recognition module SNR 9816;
the embodiment determines the voice segmentation mode according to the preset recognition fault-tolerant rate, and correspondingly segments the name of the received operation order read by the guardian and the name of the operation order obtained from the external system of the original information of the generated operation order into a plurality of sections according to the segmentation mode, lays a foundation for respectively recognizing and comparing a plurality of sections of voices subsequently, improves the existing voice recognition device by adopting the mode, and can effectively improve the accuracy of the voice recognition comparison result of the device.
For the way of determining how to perform the subsequent monitoring procedure according to the first segment identification result, in an embodiment, the method further includes:
and if the first subsection identification result represents that the name of the operation order read by the guardian is wrong, ending the current monitoring process.
If the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, executing step S103, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result; and if the first subsection identification result represents that the name of the operation order read by the guardian is wrong, ending the current monitoring process. If the first segmentation identification result represents that the name of the operation ticket read by the guardian is wrong, the first segmentation identification result indicates that the name of the operation ticket read by the guardian is inconsistent with the name of the operation ticket acquired from the external system which generates the original information of the operation ticket; the correct mode of the operation ticket name read by the guardian is indicated, and the correct prompt tone can be sent; the mode of indicating the wrong name of the operation order read by the guardian can be that an error prompt tone is given; the device emitting a correct or false alert tone may be a 4 ohm 2.5W horn.
According to the embodiment, whether the current monitoring process needs to be carried out is determined according to the received identification comparison result of the name of the operation ticket read by the guardian and the name of the operation ticket acquired from the external system generating the original information of the operation ticket, so that the link with low necessity in the monitoring process of carrying out identity verification on the guardian is omitted, and the efficiency of carrying out identity verification on the guardian is effectively improved.
As to the way of performing the subsequent monitoring process according to the first segmentation recognition result, in an embodiment, as shown in fig. 3, the step 104 specifically includes:
and S301, if the second segment identification result represents that the name of the operation order read by the operator is correct, opening the spaced electronic lock.
In this step, the second segmentation identification result represents that the name of the operation ticket read by the operator is correct, which means that the second segmentation identification result can indicate that the name of the operation ticket read by the operator is consistent with the name of the operation ticket obtained from the external system which generates the original information of the operation ticket; the correct mode of the operation ticket name read by the operator is indicated, and the correct prompt tone can be sent out; the device emitting the correct alert tone may be a 4 ohm 2.5W horn; the mode for prompting the opening of the electronic lock at intervals can be that an indicator lamp is turned on; the indicator light used for prompting the interval electronic lock to be turned on can be a bi-color LED controlled by GPIO; the spaced electronic locks may be electromagnetic locks controlled by relays.
Step S302, if the second segment identification result represents that the name of the operation ticket read by the operator is wrong, the current monitoring process is ended.
In this step, the second segmentation identification result represents that the name of the operation ticket read by the operator is wrong, which means that the name of the operation ticket read by the operator can be shown to be inconsistent with the name of the operation ticket obtained from the external system which generates the original information of the operation ticket through the second segmentation identification result; the method for indicating the error operation ticket name read by the operator can be sending an error prompt tone; the device emitting the error warning tone may be a 4 ohm 2.5W horn.
According to the embodiment, whether the electronic lock at the interval needs to be unlocked is determined according to the received identification comparison result of the name of the operation ticket read by the operator and the name of the operation ticket acquired from the external system which generates the original information of the operation ticket, so that the condition that the guardian and the operator need to enter the interval mistakenly enter the interval due to the fact that the guardian and the operation make mistakes simultaneously is effectively avoided.
For the manner of switching the monitoring device from the sleep state to the working state, in an embodiment, as shown in fig. 4, the method further includes:
step S401, receiving voice awakening words read by a guardian.
In this step, the voice wake-up word may be a phrase of any character length that can be used for voice recognition; before the function of switching the state of the monitoring device through the voice wake-up word is enabled, the setting of the voice wake-up word needs to be completed in the monitoring device in advance.
Step S402, if the voice awakening word is consistent with the preset awakening word, switching from the dormant state to the working state.
In this step, if the voice awakening word is inconsistent with the preset awakening word, the monitoring equipment continues to keep a dormant state; if the voice awakening words are consistent with the preset awakening words, the monitoring equipment can be switched from the dormant state to the working state.
According to the embodiment, the function of switching the state of the monitoring equipment according to the voice awakening words is realized by presetting the voice awakening words, and a more convenient starting mode is provided for the equipment of the monitoring method for preventing the mistaken access interval provided by the scheme.
It should be understood that, although the steps in the flowcharts related to the embodiments as described above are sequentially displayed as indicated by arrows, the steps are not necessarily performed sequentially as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a part of the steps in the flowcharts related to the embodiments described above may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the execution order of the steps or stages is not necessarily sequential, but may be rotated or alternated with other steps or at least a part of the steps or stages in other steps.
Based on the same inventive concept, the embodiment of the application also provides a device for monitoring the false access prevention interval, which is used for realizing the method for monitoring the false access prevention interval. The implementation scheme for solving the problem provided by the device is similar to the implementation scheme recorded in the method, so the specific limitations in the following one or more embodiments of the monitoring device for preventing the false entry interval may refer to the limitations on the monitoring method for preventing the false entry interval, and are not described herein again.
In one embodiment, as shown in fig. 5, there is provided a device for monitoring false access intervals, the device 500 comprising:
the information acquisition module 501 acquires the name of the operation ticket;
the first identification module 502 is used for receiving the name of the operation ticket read by the guardian, and performing segmented identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first segmented identification result;
the second identification module 503 is configured to receive the operation ticket name read by the operator if the first segment identification result represents that the operation ticket name read by the guardian is correct, and perform segment identification on the operation ticket name read by the operator and the operation ticket name to obtain a second segment identification result;
and a result judgment module 504, configured to determine whether to unlock the spaced electronic lock according to the second segment identification result.
In an embodiment, the first identifying module 502 is configured to segment the name of the operation ticket and the name of the operation ticket read by the guardian into multiple segments correspondingly according to a preset segmentation mode.
In one embodiment, the first identification module 502 is configured to determine the preset segmentation mode according to a preset identification fault tolerance.
In an embodiment, the second identifying module 503 is configured to end the current monitoring process if the first segment identifying result indicates that the name of the operation ticket read by the guardian is incorrect.
In an embodiment, the result determining module 504 is configured to open the electronic lock at the interval if the second segment identification result indicates that the name of the operation ticket read by the operator is correct; and if the second subsection identification result represents that the name of the operation order read by the operator is wrong, ending the current monitoring process.
In one embodiment, the above device is further configured to receive a voice wake-up word spoken by the guardian; and if the voice awakening words are consistent with the preset awakening words, switching from the dormant state to the working state.
All or part of each module in the monitoring device for preventing the false entering into the interval can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 6. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a method of monitoring for a false entry prevention interval. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on a shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is further provided, which includes a memory and a processor, the memory stores a computer program, and the processor implements the steps of the above method embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
In an embodiment, a computer program product is provided, comprising a computer program which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, databases, or other media used in the embodiments provided herein can include at least one of non-volatile and volatile memory. The nonvolatile Memory may include a Read-Only Memory (ROM), a magnetic tape, a floppy disk, a flash Memory, an optical Memory, a high-density embedded nonvolatile Memory, a resistive Random Access Memory (ReRAM), a Magnetic Random Access Memory (MRAM), a Ferroelectric Random Access Memory (FRAM), a Phase Change Memory (PCM), a graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others. The databases referred to in various embodiments provided herein may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing based data processing logic devices, etc., without limitation.
It should be noted that, the user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (10)

1. A method for monitoring a false entry prevention interval, the method comprising:
acquiring the name of an operation ticket;
receiving the name of an operation ticket read by a guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result;
if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result;
and determining whether the spaced electronic lock needs to be unlocked or not according to the second segment identification result.
2. The method according to claim 1, wherein before the step of identifying the operation ticket name read by the guardian and the operation ticket name in a segmented manner, the method further comprises:
and correspondingly dividing the name of the operation ticket and the name of the operation ticket read by the guardian into a plurality of sections according to a preset segmentation mode.
3. The method of claim 2, further comprising:
and determining the preset segmentation mode according to a preset identification fault tolerance rate.
4. The method of claim 1, further comprising:
and if the first segment identification result represents that the name of the operation order read by the guardian is wrong, ending the current monitoring process.
5. The method of claim 1, wherein determining whether an alternate electronic lock needs to be unlocked based on the second segment identification comprises:
if the second segment identification result represents that the name of the operation order read by the operator is correct, the electronic lock at the interval is opened;
and if the second subsection identification result represents that the name of the operation order read by the operator is wrong, ending the current monitoring process.
6. The method according to any one of claims 1 to 5, wherein before the receiving of the operation order name read by the guardian, the method further comprises:
receiving voice awakening words read aloud by the guardian;
and if the voice awakening words are consistent with the preset awakening words, switching from the dormant state to the working state.
7. A device for monitoring a false access prevention interval, the device comprising:
the information acquisition module is used for acquiring the name of the operation ticket;
the first identification module is used for receiving the name of the operation ticket read by the guardian, and performing segmented identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first segmented identification result;
the second identification module is used for receiving the operation ticket name read by the operator if the first sectional identification result represents that the operation ticket name read by the guardian is correct, and performing sectional identification on the operation ticket name read by the operator and the operation ticket name to obtain a second sectional identification result;
and the result judgment module is used for determining whether the spaced electronic lock needs to be opened or not according to the second segment identification result.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of any one of claims 1 to 6 when executing the computer program.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program realizes the steps of the method of any one of claims 1 to 6 when executed by a processor.
CN202210534414.7A 2022-05-17 2022-05-17 Method, apparatus, device, medium and program product for monitoring false entry prevention interval Active CN115019809B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210534414.7A CN115019809B (en) 2022-05-17 2022-05-17 Method, apparatus, device, medium and program product for monitoring false entry prevention interval

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210534414.7A CN115019809B (en) 2022-05-17 2022-05-17 Method, apparatus, device, medium and program product for monitoring false entry prevention interval

Publications (2)

Publication Number Publication Date
CN115019809A true CN115019809A (en) 2022-09-06
CN115019809B CN115019809B (en) 2024-04-02

Family

ID=83068223

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210534414.7A Active CN115019809B (en) 2022-05-17 2022-05-17 Method, apparatus, device, medium and program product for monitoring false entry prevention interval

Country Status (1)

Country Link
CN (1) CN115019809B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190005954A1 (en) * 2017-06-30 2019-01-03 Baidu Online Network Technology (Beijing) Co., Ltd. Wake-on-voice method, terminal and storage medium
CN111353487A (en) * 2019-08-20 2020-06-30 国网浙江省电力有限公司台州供电公司 Equipment information extraction method for transformer substation
CN111884332A (en) * 2020-06-30 2020-11-03 国网山东省电力公司淄博供电公司 Switching operation ticket clamp plate with intelligent guiding function
CN113470650A (en) * 2021-05-11 2021-10-01 云南电网有限责任公司 Operation ticket anti-error method based on voice recognition
CN114333853A (en) * 2020-09-25 2022-04-12 华为技术有限公司 Audio data processing method, equipment and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190005954A1 (en) * 2017-06-30 2019-01-03 Baidu Online Network Technology (Beijing) Co., Ltd. Wake-on-voice method, terminal and storage medium
CN111353487A (en) * 2019-08-20 2020-06-30 国网浙江省电力有限公司台州供电公司 Equipment information extraction method for transformer substation
CN111884332A (en) * 2020-06-30 2020-11-03 国网山东省电力公司淄博供电公司 Switching operation ticket clamp plate with intelligent guiding function
CN114333853A (en) * 2020-09-25 2022-04-12 华为技术有限公司 Audio data processing method, equipment and system
CN113470650A (en) * 2021-05-11 2021-10-01 云南电网有限责任公司 Operation ticket anti-error method based on voice recognition

Also Published As

Publication number Publication date
CN115019809B (en) 2024-04-02

Similar Documents

Publication Publication Date Title
CN102842007B (en) Access control method and system of mobile terminal application program
WO2020134657A1 (en) System log desensitization method, desensitization system, computer device, and storage medium
CN108417216B (en) Voice verification method and device, computer equipment and storage medium
CN105072249A (en) Method and device of preventing mobile device from being stolen, and corresponding mobile device
CN110460583A (en) A kind of sensitive information recording method and device, electronic equipment
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
WO2023045747A1 (en) Fingerprint unlocking control method and apparatus, terminal device and storage medium
CN108604268A (en) A kind of voice unlocking method and terminal of terminal
CN111143798A (en) Security verification method and device
CN115019809B (en) Method, apparatus, device, medium and program product for monitoring false entry prevention interval
US20240020459A1 (en) Using machine learning to predict performance of secure documents
CN107678727A (en) Terminal control method and device, computer installation and readable storage medium storing program for executing
CN114974258A (en) Speaker separation method, device, equipment and storage medium based on voice processing
CN110750162B (en) Input method and device
CN114692228A (en) Security monitoring method, device, equipment and readable storage medium
CN110086942B (en) Anti-theft method, device and equipment of intelligent terminal and storage medium
CN111899744A (en) Voice information processing method, device, server and storage medium
CN106778284B (en) Method and device for detecting kernel vulnerability back end
CN112162929B (en) Test data generation method and device, computer equipment and storage medium
US20220366086A1 (en) Digital signatures for analytics
US20240184876A1 (en) Multi-dimensional voice-based digital authentication
CN112199350B (en) Function verification method and device based on data screening, computer equipment and medium
US11762940B2 (en) Component level data management and state change detection in web applications for data loss protection
CN117034244A (en) Account security authentication method, account security authentication device, computer equipment and storage medium
CN116562878A (en) Identity verification method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant