CN115019809A - Method, apparatus, device, medium, and program product for preventing false entry into an interval - Google Patents
Method, apparatus, device, medium, and program product for preventing false entry into an interval Download PDFInfo
- Publication number
- CN115019809A CN115019809A CN202210534414.7A CN202210534414A CN115019809A CN 115019809 A CN115019809 A CN 115019809A CN 202210534414 A CN202210534414 A CN 202210534414A CN 115019809 A CN115019809 A CN 115019809A
- Authority
- CN
- China
- Prior art keywords
- name
- operation ticket
- read
- guardian
- identification result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 230000011218 segmentation Effects 0.000 claims abstract description 56
- 238000012544 monitoring process Methods 0.000 claims abstract description 35
- 238000004590 computer program Methods 0.000 claims description 21
- 230000002265 prevention Effects 0.000 claims description 11
- 238000004891 communication Methods 0.000 abstract description 9
- 238000004519 manufacturing process Methods 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 7
- 238000012806 monitoring device Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 229910021389 graphene Inorganic materials 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/279—Recognition of textual entities
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/04—Segmentation; Word boundary detection
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/22—Procedures used during a speech recognition process, e.g. man-machine dialogue
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Acoustics & Sound (AREA)
- Human Computer Interaction (AREA)
- Computational Linguistics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Artificial Intelligence (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Devices For Checking Fares Or Tickets At Control Points (AREA)
- Alarm Systems (AREA)
Abstract
The application relates to the field of electric power safety, and provides a method, a device, equipment, a medium and a program product for monitoring an anti-false-entry interval. According to the method and the system, the identity of the power operation personnel can be accurately verified on the premise of not depending on the communication signal state of the server, and the method and the system can be realized only by equipment with a simpler structure and a lower manufacturing cost. The method comprises the following steps: acquiring the name of an operation ticket; receiving the name of an operation ticket read by a guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result; if the first segmentation identification result represents that the operation order name read by the guardian is correct, receiving the operation order name read by the operator, and performing segmentation identification on the operation order name read by the operator and the operation order name to obtain a second segmentation identification result; and determining whether the spaced electronic lock needs to be unlocked or not according to the second segment identification result.
Description
Technical Field
The present application relates to the field of electrical safety technologies, and in particular, to a method, an apparatus, a device, a medium, and a program product for monitoring a false access prevention interval.
Background
With the development of the technical field of electric power safety, more and more substations select a mode of carrying out multiple times of identity verification on electric power operators entering an interval, so that the occurrence of vicious misoperation accidents such as equipment tripping and system power failure which can cause great hidden dangers to electric power safety production due to the fact that the electric power operators enter the interval by mistake is avoided.
At present, a method based on the combination of Bluetooth and NFC technologies can be adopted to carry out double identity authentication on electric power operators, but the equipment structure required for realizing the method is complex, the manufacturing cost is high, and the accuracy of the identity authentication of the electric power operators by using the method is high and depends on the communication signal state of a server.
Disclosure of Invention
In view of the above, it is necessary to provide a method, an apparatus, a device, a medium, and a program product for monitoring a false entry prevention interval.
In a first aspect, the application provides a method for monitoring a false access prevention interval. The method comprises the following steps:
acquiring the name of an operation ticket;
receiving the name of an operation ticket read by a guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result;
if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result;
and determining whether the spaced electronic lock needs to be unlocked or not according to the second segment identification result.
In a second aspect, the present application further provides a device for monitoring false access prevention intervals. The device comprises:
the information acquisition module is used for acquiring the name of the operation ticket;
the first identification module is used for receiving the name of the operation ticket read by the guardian, and performing segmented identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first segmented identification result;
the second identification module is used for receiving the operation ticket name read by the operator if the first sectional identification result represents that the operation ticket name read by the guardian is correct, and performing sectional identification on the operation ticket name read by the operator and the operation ticket name to obtain a second sectional identification result;
and the result judgment module is used for determining whether the spaced electronic lock needs to be unlocked according to the second segment identification result.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory storing a computer program and a processor implementing the following steps when executing the computer program:
acquiring the name of an operation ticket; receiving the name of an operation ticket read by a guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result; if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result; and determining whether the spaced electronic lock needs to be unlocked or not according to the second segment identification result.
In a fourth aspect, the present application further provides a computer-readable storage medium. The computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring the name of an operation ticket; receiving the name of an operation ticket read by a guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result; if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result; and determining whether the spaced electronic lock needs to be unlocked or not according to the second segment identification result.
In a fifth aspect, the present application further provides a computer program product. The computer program product comprising a computer program which when executed by a processor performs the steps of:
acquiring the name of an operation ticket; receiving the name of an operation ticket read by a guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result; if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result; and determining whether the spaced electronic lock needs to be unlocked or not according to the second segment identification result.
The method, the device, the equipment, the medium and the program product for monitoring the anti-false-entry interval firstly acquire the name of the operation ticket. And then, receiving the name of the operation ticket read by the guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result. And then, if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result. And finally, determining whether the spaced electronic lock needs to be unlocked according to the second segment identification result. This scheme passes through the mode of pronunciation segmentation discernment, discerns the operation ticket name of reading aloud to guardian and operation person respectively and verifies, not only can do not rely on under the prerequisite of the communication signal state of server, accurately carry out authentication to the electric power operation personnel, and only need can realize through the equipment that the structure is comparatively simple, the manufacturing cost is lower.
Drawings
FIG. 1 is a schematic flow chart of a method for monitoring an anti-false-entry interval according to an embodiment;
FIG. 2 is a flow diagram illustrating an embodiment of segmented speech recognition in one embodiment;
FIG. 3 is a flow diagram illustrating the manner in which subsequent monitoring processes are performed based on the first segmented identification result in one embodiment;
FIG. 4 is a flow diagram illustrating the manner in which a monitoring device may be switched from a sleep state to an active state in one embodiment;
FIG. 5 is a block diagram of an embodiment of a device for monitoring a miss-entry prevention interval;
FIG. 6 is a diagram of the internal structure of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The method for monitoring the false entry prevention interval can be applied to terminal execution. The terminal can be, but is not limited to, various personal computers, notebook computers, tablet computers and internet of things equipment.
In an embodiment, as shown in fig. 1, a method for monitoring an anti-false-entry interval is provided, which is described by taking an example that the method is applied to a terminal, and includes the following steps:
in step S101, the name of the operation ticket is acquired.
In this step, the original information of the operation ticket may be generated by an operator submitting an application for obtaining the operation ticket in an external system; the recording form of the operation ticket can be a paper form; the name of the operation ticket can be acquired on the basis that the original information of the operation ticket is generated. Therefore, in the case where the source of the original information forming the operation ticket and the premise of acquiring the name of the operation ticket are made clear, the name of the operation ticket may be acquired from an external system that has generated the original information of the operation ticket.
And S102, receiving the name of the operation ticket read by the guardian, and performing segmented identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first segmented identification result.
In this step, the device for receiving the name of the operation order read aloud by the guardian can be a single microphone or a double microphone, and when the double microphones are used, the effect of positioning the voice direction can be realized; the name of the operation ticket read by the guardian can be generated by reading the name recorded in the operation ticket by the guardian; performing segmented identification on the name of the operation ticket read by the guardian and the name of the operation ticket, namely correspondingly dividing the received name of the operation ticket read by the guardian and the name of the operation ticket obtained from an external system generating original information of the operation ticket into multiple segments and performing corresponding identification; the first segmentation identification result is obtained by correspondingly identifying the name of the operation ticket read by the guardian which is correspondingly segmented into a plurality of segments and the name of the operation ticket; the means for obtaining the first segment recognition result may be the AI speech recognition module SNR 9816.
And step S103, if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result.
In the step, the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, which means that the name of the operation ticket read by the guardian can be shown to be consistent with the name of the operation ticket obtained from the external system which generates the original information of the operation ticket through the first segmentation identification result; the device for receiving the name of the operation ticket read by the operator can be a single microphone or a double microphone, and when the double microphone is used, the effect of positioning the voice direction can be realized; the operation ticket name read by the operator may be generated by reading the name recorded in the operation ticket by the operator; performing segmented identification on the operation ticket name read by an operator and the name of the operation ticket, namely dividing the received operation ticket name read by the operator into a plurality of segments corresponding to the operation ticket name acquired from an external system generating original information of the operation ticket, and performing corresponding identification; a second segment recognition result, which is a result of recognizing the operation ticket name read by the operator who has been divided into a plurality of segments correspondingly and the name of the operation ticket; the means for obtaining the second segment recognition result may be the AI speech recognition module SNR 9816.
And step S104, determining whether the electronic lock at the interval needs to be unlocked according to the second segment identification result.
In the step, according to the second segment identification result, whether the name of the operation ticket read by the operator is consistent with the name of the operation ticket obtained from the external system generating the original information of the operation ticket is judged according to the second segment identification result; and according to the second section identification result, after the electronic lock at the interval is determined to be opened, the current monitoring process can be ended.
The method for monitoring the anti-false-entry interval comprises the following steps of firstly, obtaining the name of an operation ticket. And then, receiving the name of the operation ticket read by the guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result. And then, if the first segmentation identification result represents that the operation order name read by the guardian is correct, receiving the operation order name read by the operator, and performing segmentation identification on the operation order name read by the operator and the operation order name to obtain a second segmentation identification result. And finally, determining whether the spaced electronic lock needs to be unlocked according to the second segment identification result. This scheme passes through the mode of pronunciation segmentation discernment, discerns the operation ticket name of reading aloud to guardian and operation person respectively and verifies, not only can do not rely on under the prerequisite of the communication signal state of server, accurately carry out authentication to the electric power operation personnel, and only need can realize through the equipment that the structure is comparatively simple, the manufacturing cost is lower.
As for the method of segmenting the operation ticket name according to the preset segmentation method, in an embodiment, the step S102 further includes:
and correspondingly dividing the name of the operation ticket and the name of the operation ticket read by the guardian into a plurality of sections according to a preset segmentation mode. The preset segmentation mode can be determined according to the preset identification fault tolerance rate.
The preset identification fault tolerance rate refers to the rate that the name of an operation ticket read by a guardian is allowed to be inconsistent with the name of an operation ticket acquired from an external system which generates original information of the operation ticket; when the operation ticket names read by the guardian which are correspondingly divided into multiple sections are compared with the operation ticket names, the identification result can be determined to represent that the operation ticket names read by the guardian are wrong as long as the comparison error rate of any section is higher than the preset identification fault-tolerant rate; the preset segmentation mode is determined according to the preset identification fault tolerance rate, namely the length of the character contained in each segment is determined according to the mode that the rate of one error in each segment after segmentation cannot be higher than the preset identification fault tolerance rate.
For example, if the preset recognition fault tolerance is 20%, when the operation ticket name with the total length of 11 characters is segmented, the operation ticket name can be divided into two segments each including 4 characters and one segment including 3 characters. Because the error rate of 1 character in 4 characters is 25%, the error rate of 1 character in 3 characters is 33%, and both 25% and 33% are lower than the preset recognition fault-tolerant rate by 20%, the segmentation mode meets the requirement that the error rate of each segment after segmentation cannot be higher than the preset recognition fault-tolerant rate.
Further, for the embodiment of segmented speech recognition, taking two segments each containing 4 characters and one segment containing 3 characters, which are obtained by splitting the operation ticket name read by the guardian and have a total length of 11 characters, as shown in fig. 2, the method further includes:
step S201, truncating a content with a character length consistent with a first segment obtained by segmenting the name of the operation ticket obtained from the external system of the original information of the generated operation ticket from the received name of the operation ticket read aloud by the guardian, and comparing the truncated content with the first segment obtained by segmenting the name of the operation ticket obtained from the external system of the original information of the generated operation ticket to obtain a first comparison result.
Step S202, if the error rate in the first comparison result is not higher than the preset identification fault-tolerant rate, intercepting the content with the same length as the second section of the character segmented from the name of the operation ticket acquired from the external system of the original information of the generated operation ticket from the rest part of the name of the received operation ticket read aloud by the guardian, and comparing the intercepted content with the second section of the character segmented from the name of the operation ticket acquired from the external system of the original information of the generated operation ticket to obtain a second comparison result.
If the error rate in the first comparison result is higher than the preset identification fault-tolerant rate, ending the current comparison process; if the error rate in the first comparison result is not higher than the preset identification fault-tolerant rate, continuously intercepting the content with the same character length as the second segment of the operation ticket segmented from the name of the operation ticket obtained from the external system which generates the original information of the operation ticket from the rest part of the name of the received operation ticket read by the guardian; the remaining part of the name of the operation ticket read by the guardian is the remaining part of the received operation ticket read by the guardian after the first piece of content is cut out.
Step S203, if the error rate in the second comparison result is not higher than the preset identification fault tolerance rate, truncating a content with a character length consistent with a third segment obtained by segmenting the name of the operation ticket obtained from the external system that has generated the original information of the operation ticket from the remaining part of the name of the operation ticket read aloud by the guardian, and comparing the truncated content with the third segment obtained by segmenting the name of the operation ticket obtained from the external system that has generated the original information of the operation ticket to obtain a third comparison result.
If the error rate in the second comparison result is higher than the preset identification fault-tolerant rate, ending the current comparison process; if the error rate in the second comparison result is not higher than the preset identification fault-tolerant rate, continuously intercepting the content with the same character length as the third section of the operation ticket obtained by the name segmentation of the operation ticket acquired from the external system which generates the original information of the operation ticket from the rest part of the received operation ticket read by the guardian; the remaining part of the name of the operation ticket read by the guardian is the remaining part of the received operation ticket read by the guardian after the contents of the first section and the second section are cut out.
In step S204, if the error rate in the third comparison result is not higher than the preset identification fault-tolerant rate, it indicates that the name of the operation ticket read by the guardian is consistent with the name of the operation ticket obtained from the external system that has generated the original information of the operation ticket, so that the first sectional identification result indicating that the name of the operation ticket read by the guardian is correct can be obtained.
If the error rate in the third comparison result is higher than the preset identification fault-tolerant rate, ending the current comparison process; if the error rate in the third comparison result is not higher than the preset identification fault-tolerant rate, it is indicated that the name of the operation ticket read by the guardian is consistent with the name of the operation ticket obtained from the external system generating the original information of the operation ticket, so that a first subsection identification result representing that the name of the operation ticket read by the guardian is correct can be obtained; after the first segment identification result representing that the name of the operation order read by the guardian is correct is obtained, the step S103 can be continuously executed.
In the above steps S201 to S204, the means for intercepting the content from the name of the operation ticket read by the guardian and comparing the content with the corresponding part of the operation ticket obtained from the external system that has generated the original information of the operation ticket may be an AI voice recognition module SNR 9816;
the embodiment determines the voice segmentation mode according to the preset recognition fault-tolerant rate, and correspondingly segments the name of the received operation order read by the guardian and the name of the operation order obtained from the external system of the original information of the generated operation order into a plurality of sections according to the segmentation mode, lays a foundation for respectively recognizing and comparing a plurality of sections of voices subsequently, improves the existing voice recognition device by adopting the mode, and can effectively improve the accuracy of the voice recognition comparison result of the device.
For the way of determining how to perform the subsequent monitoring procedure according to the first segment identification result, in an embodiment, the method further includes:
and if the first subsection identification result represents that the name of the operation order read by the guardian is wrong, ending the current monitoring process.
If the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, executing step S103, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result; and if the first subsection identification result represents that the name of the operation order read by the guardian is wrong, ending the current monitoring process. If the first segmentation identification result represents that the name of the operation ticket read by the guardian is wrong, the first segmentation identification result indicates that the name of the operation ticket read by the guardian is inconsistent with the name of the operation ticket acquired from the external system which generates the original information of the operation ticket; the correct mode of the operation ticket name read by the guardian is indicated, and the correct prompt tone can be sent; the mode of indicating the wrong name of the operation order read by the guardian can be that an error prompt tone is given; the device emitting a correct or false alert tone may be a 4 ohm 2.5W horn.
According to the embodiment, whether the current monitoring process needs to be carried out is determined according to the received identification comparison result of the name of the operation ticket read by the guardian and the name of the operation ticket acquired from the external system generating the original information of the operation ticket, so that the link with low necessity in the monitoring process of carrying out identity verification on the guardian is omitted, and the efficiency of carrying out identity verification on the guardian is effectively improved.
As to the way of performing the subsequent monitoring process according to the first segmentation recognition result, in an embodiment, as shown in fig. 3, the step 104 specifically includes:
and S301, if the second segment identification result represents that the name of the operation order read by the operator is correct, opening the spaced electronic lock.
In this step, the second segmentation identification result represents that the name of the operation ticket read by the operator is correct, which means that the second segmentation identification result can indicate that the name of the operation ticket read by the operator is consistent with the name of the operation ticket obtained from the external system which generates the original information of the operation ticket; the correct mode of the operation ticket name read by the operator is indicated, and the correct prompt tone can be sent out; the device emitting the correct alert tone may be a 4 ohm 2.5W horn; the mode for prompting the opening of the electronic lock at intervals can be that an indicator lamp is turned on; the indicator light used for prompting the interval electronic lock to be turned on can be a bi-color LED controlled by GPIO; the spaced electronic locks may be electromagnetic locks controlled by relays.
Step S302, if the second segment identification result represents that the name of the operation ticket read by the operator is wrong, the current monitoring process is ended.
In this step, the second segmentation identification result represents that the name of the operation ticket read by the operator is wrong, which means that the name of the operation ticket read by the operator can be shown to be inconsistent with the name of the operation ticket obtained from the external system which generates the original information of the operation ticket through the second segmentation identification result; the method for indicating the error operation ticket name read by the operator can be sending an error prompt tone; the device emitting the error warning tone may be a 4 ohm 2.5W horn.
According to the embodiment, whether the electronic lock at the interval needs to be unlocked is determined according to the received identification comparison result of the name of the operation ticket read by the operator and the name of the operation ticket acquired from the external system which generates the original information of the operation ticket, so that the condition that the guardian and the operator need to enter the interval mistakenly enter the interval due to the fact that the guardian and the operation make mistakes simultaneously is effectively avoided.
For the manner of switching the monitoring device from the sleep state to the working state, in an embodiment, as shown in fig. 4, the method further includes:
step S401, receiving voice awakening words read by a guardian.
In this step, the voice wake-up word may be a phrase of any character length that can be used for voice recognition; before the function of switching the state of the monitoring device through the voice wake-up word is enabled, the setting of the voice wake-up word needs to be completed in the monitoring device in advance.
Step S402, if the voice awakening word is consistent with the preset awakening word, switching from the dormant state to the working state.
In this step, if the voice awakening word is inconsistent with the preset awakening word, the monitoring equipment continues to keep a dormant state; if the voice awakening words are consistent with the preset awakening words, the monitoring equipment can be switched from the dormant state to the working state.
According to the embodiment, the function of switching the state of the monitoring equipment according to the voice awakening words is realized by presetting the voice awakening words, and a more convenient starting mode is provided for the equipment of the monitoring method for preventing the mistaken access interval provided by the scheme.
It should be understood that, although the steps in the flowcharts related to the embodiments as described above are sequentially displayed as indicated by arrows, the steps are not necessarily performed sequentially as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a part of the steps in the flowcharts related to the embodiments described above may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the execution order of the steps or stages is not necessarily sequential, but may be rotated or alternated with other steps or at least a part of the steps or stages in other steps.
Based on the same inventive concept, the embodiment of the application also provides a device for monitoring the false access prevention interval, which is used for realizing the method for monitoring the false access prevention interval. The implementation scheme for solving the problem provided by the device is similar to the implementation scheme recorded in the method, so the specific limitations in the following one or more embodiments of the monitoring device for preventing the false entry interval may refer to the limitations on the monitoring method for preventing the false entry interval, and are not described herein again.
In one embodiment, as shown in fig. 5, there is provided a device for monitoring false access intervals, the device 500 comprising:
the information acquisition module 501 acquires the name of the operation ticket;
the first identification module 502 is used for receiving the name of the operation ticket read by the guardian, and performing segmented identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first segmented identification result;
the second identification module 503 is configured to receive the operation ticket name read by the operator if the first segment identification result represents that the operation ticket name read by the guardian is correct, and perform segment identification on the operation ticket name read by the operator and the operation ticket name to obtain a second segment identification result;
and a result judgment module 504, configured to determine whether to unlock the spaced electronic lock according to the second segment identification result.
In an embodiment, the first identifying module 502 is configured to segment the name of the operation ticket and the name of the operation ticket read by the guardian into multiple segments correspondingly according to a preset segmentation mode.
In one embodiment, the first identification module 502 is configured to determine the preset segmentation mode according to a preset identification fault tolerance.
In an embodiment, the second identifying module 503 is configured to end the current monitoring process if the first segment identifying result indicates that the name of the operation ticket read by the guardian is incorrect.
In an embodiment, the result determining module 504 is configured to open the electronic lock at the interval if the second segment identification result indicates that the name of the operation ticket read by the operator is correct; and if the second subsection identification result represents that the name of the operation order read by the operator is wrong, ending the current monitoring process.
In one embodiment, the above device is further configured to receive a voice wake-up word spoken by the guardian; and if the voice awakening words are consistent with the preset awakening words, switching from the dormant state to the working state.
All or part of each module in the monitoring device for preventing the false entering into the interval can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 6. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a method of monitoring for a false entry prevention interval. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on a shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is further provided, which includes a memory and a processor, the memory stores a computer program, and the processor implements the steps of the above method embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
In an embodiment, a computer program product is provided, comprising a computer program which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, databases, or other media used in the embodiments provided herein can include at least one of non-volatile and volatile memory. The nonvolatile Memory may include a Read-Only Memory (ROM), a magnetic tape, a floppy disk, a flash Memory, an optical Memory, a high-density embedded nonvolatile Memory, a resistive Random Access Memory (ReRAM), a Magnetic Random Access Memory (MRAM), a Ferroelectric Random Access Memory (FRAM), a Phase Change Memory (PCM), a graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others. The databases referred to in various embodiments provided herein may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing based data processing logic devices, etc., without limitation.
It should be noted that, the user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.
Claims (10)
1. A method for monitoring a false entry prevention interval, the method comprising:
acquiring the name of an operation ticket;
receiving the name of an operation ticket read by a guardian, and carrying out sectional identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first sectional identification result;
if the first segmentation identification result represents that the name of the operation ticket read by the guardian is correct, receiving the name of the operation ticket read by the operator, and performing segmentation identification on the name of the operation ticket read by the operator and the name of the operation ticket to obtain a second segmentation identification result;
and determining whether the spaced electronic lock needs to be unlocked or not according to the second segment identification result.
2. The method according to claim 1, wherein before the step of identifying the operation ticket name read by the guardian and the operation ticket name in a segmented manner, the method further comprises:
and correspondingly dividing the name of the operation ticket and the name of the operation ticket read by the guardian into a plurality of sections according to a preset segmentation mode.
3. The method of claim 2, further comprising:
and determining the preset segmentation mode according to a preset identification fault tolerance rate.
4. The method of claim 1, further comprising:
and if the first segment identification result represents that the name of the operation order read by the guardian is wrong, ending the current monitoring process.
5. The method of claim 1, wherein determining whether an alternate electronic lock needs to be unlocked based on the second segment identification comprises:
if the second segment identification result represents that the name of the operation order read by the operator is correct, the electronic lock at the interval is opened;
and if the second subsection identification result represents that the name of the operation order read by the operator is wrong, ending the current monitoring process.
6. The method according to any one of claims 1 to 5, wherein before the receiving of the operation order name read by the guardian, the method further comprises:
receiving voice awakening words read aloud by the guardian;
and if the voice awakening words are consistent with the preset awakening words, switching from the dormant state to the working state.
7. A device for monitoring a false access prevention interval, the device comprising:
the information acquisition module is used for acquiring the name of the operation ticket;
the first identification module is used for receiving the name of the operation ticket read by the guardian, and performing segmented identification on the name of the operation ticket read by the guardian and the name of the operation ticket to obtain a first segmented identification result;
the second identification module is used for receiving the operation ticket name read by the operator if the first sectional identification result represents that the operation ticket name read by the guardian is correct, and performing sectional identification on the operation ticket name read by the operator and the operation ticket name to obtain a second sectional identification result;
and the result judgment module is used for determining whether the spaced electronic lock needs to be opened or not according to the second segment identification result.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of any one of claims 1 to 6 when executing the computer program.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program realizes the steps of the method of any one of claims 1 to 6 when executed by a processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210534414.7A CN115019809B (en) | 2022-05-17 | 2022-05-17 | Method, apparatus, device, medium and program product for monitoring false entry prevention interval |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210534414.7A CN115019809B (en) | 2022-05-17 | 2022-05-17 | Method, apparatus, device, medium and program product for monitoring false entry prevention interval |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115019809A true CN115019809A (en) | 2022-09-06 |
CN115019809B CN115019809B (en) | 2024-04-02 |
Family
ID=83068223
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210534414.7A Active CN115019809B (en) | 2022-05-17 | 2022-05-17 | Method, apparatus, device, medium and program product for monitoring false entry prevention interval |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115019809B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190005954A1 (en) * | 2017-06-30 | 2019-01-03 | Baidu Online Network Technology (Beijing) Co., Ltd. | Wake-on-voice method, terminal and storage medium |
CN111353487A (en) * | 2019-08-20 | 2020-06-30 | 国网浙江省电力有限公司台州供电公司 | Equipment information extraction method for transformer substation |
CN111884332A (en) * | 2020-06-30 | 2020-11-03 | 国网山东省电力公司淄博供电公司 | Switching operation ticket clamp plate with intelligent guiding function |
CN113470650A (en) * | 2021-05-11 | 2021-10-01 | 云南电网有限责任公司 | Operation ticket anti-error method based on voice recognition |
CN114333853A (en) * | 2020-09-25 | 2022-04-12 | 华为技术有限公司 | Audio data processing method, equipment and system |
-
2022
- 2022-05-17 CN CN202210534414.7A patent/CN115019809B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190005954A1 (en) * | 2017-06-30 | 2019-01-03 | Baidu Online Network Technology (Beijing) Co., Ltd. | Wake-on-voice method, terminal and storage medium |
CN111353487A (en) * | 2019-08-20 | 2020-06-30 | 国网浙江省电力有限公司台州供电公司 | Equipment information extraction method for transformer substation |
CN111884332A (en) * | 2020-06-30 | 2020-11-03 | 国网山东省电力公司淄博供电公司 | Switching operation ticket clamp plate with intelligent guiding function |
CN114333853A (en) * | 2020-09-25 | 2022-04-12 | 华为技术有限公司 | Audio data processing method, equipment and system |
CN113470650A (en) * | 2021-05-11 | 2021-10-01 | 云南电网有限责任公司 | Operation ticket anti-error method based on voice recognition |
Also Published As
Publication number | Publication date |
---|---|
CN115019809B (en) | 2024-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110263585B (en) | Test supervision method, device, equipment and storage medium | |
WO2020134657A1 (en) | System log desensitization method, desensitization system, computer device, and storage medium | |
CN102842007B (en) | Access control method and system of mobile terminal application program | |
EP3147768A1 (en) | Screen interface unlocking method and screen interface unlocking device | |
WO2018113577A1 (en) | Online ticket check method and system based on client interface, and smart device | |
WO2019174073A1 (en) | Method and device for modifying client information in conversation, computer device and storage medium | |
WO2022116487A1 (en) | Voice processing method and apparatus based on generative adversarial network, device, and medium | |
CN105072249A (en) | Method and device of preventing mobile device from being stolen, and corresponding mobile device | |
CN107633169A (en) | A kind of terminal unlock method, terminal and computer-readable recording medium | |
CN114640503A (en) | Application system verification method and device, computer equipment and storage medium | |
CN110460583A (en) | A kind of sensitive information recording method and device, electronic equipment | |
CN107370872A (en) | Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine | |
CN105050061A (en) | Method and device for sending messages on the basis of user voiceprint information | |
CN114974258A (en) | Speaker separation method, device, equipment and storage medium based on voice processing | |
CN111143798A (en) | Security verification method and device | |
WO2022017152A1 (en) | Resource transfer method and apparatus, computer device, and storage medium | |
CN115019809B (en) | Method, apparatus, device, medium and program product for monitoring false entry prevention interval | |
US20240020459A1 (en) | Using machine learning to predict performance of secure documents | |
CN113343211A (en) | Data processing method, processing system, electronic device and storage medium | |
CN115756255A (en) | Method, device and equipment for processing equipment parameters of parking lot equipment and storage medium | |
CN110750162B (en) | Input method and device | |
CN110086942B (en) | Anti-theft method, device and equipment of intelligent terminal and storage medium | |
CN111899744A (en) | Voice information processing method, device, server and storage medium | |
US11568090B2 (en) | Digital signatures for analytics | |
CN112199350B (en) | Function verification method and device based on data screening, computer equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |