CN115293307A - Personnel management method and device based on electronic tag technology and storage medium - Google Patents

Personnel management method and device based on electronic tag technology and storage medium Download PDF

Info

Publication number
CN115293307A
CN115293307A CN202210895479.4A CN202210895479A CN115293307A CN 115293307 A CN115293307 A CN 115293307A CN 202210895479 A CN202210895479 A CN 202210895479A CN 115293307 A CN115293307 A CN 115293307A
Authority
CN
China
Prior art keywords
electronic tag
personnel
writer
tag reader
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210895479.4A
Other languages
Chinese (zh)
Inventor
黎小坚
曾安福
郑晓岩
杜洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202210895479.4A priority Critical patent/CN115293307A/en
Publication of CN115293307A publication Critical patent/CN115293307A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Alarm Systems (AREA)

Abstract

The disclosure relates to the technical field of personnel management based on electronic tags, and provides a personnel management method and device based on an electronic tag technology and electronic equipment. The method comprises the following steps: the method comprises the steps that tag data sent by an electronic tag reader-writer carried by personnel are obtained, wherein the tag data are obtained by reading any electronic tag distributed in a safety control area through the electronic tag reader-writer; determining location information for the person based on the tag data; and determining whether to perform early warning for the personnel based on the positioning information and the binding identity information of the personnel. The embodiment of the disclosure can greatly reduce the use cost while early warning is carried out in time.

Description

Personnel management method and device based on electronic tag technology and storage medium
Technical Field
The present disclosure relates to the field of personnel management technologies based on electronic tags, and in particular, to a personnel management method, an apparatus, and a storage medium based on an electronic tag technology.
Background
In the inter-vehicle management of the special production of the factory, some areas need to carry out strict safety production management on employees, for example, some areas prohibit non-professional personnel from entering, some areas prohibit irrelevant personnel from moving freely, and the like, so as to prevent safety accidents. In this case, it is necessary to control the employees in these areas. Often through set up electronic tags in staff's frock (like the frock boots) among the prior art, the regional read write line that sets up of safety control because every early warning region all need set up a plurality of electronic tags read write lines to still need carry out operations such as wiring or installation, lead to the cost higher.
Disclosure of Invention
In view of this, embodiments of the present disclosure provide a personnel management method and apparatus based on an electronic tag technology, and a storage medium, so as to solve the problem that in the prior art, a plurality of electronic tag readers need to be set, and operations such as wiring or installation need to be performed, which results in higher cost.
In a first aspect of the embodiments of the present disclosure, a method for managing staff based on an electronic tag technology is provided, where the method is applied to a server, and includes:
the method comprises the steps that tag data sent by an electronic tag reader-writer carried by personnel are obtained, wherein the tag data are obtained by the electronic tag reader-writer reading any electronic tag distributed in a safety control area;
determining location information for the person based on the tag data;
and determining whether to perform early warning for the personnel based on the positioning information and the binding identity information of the personnel.
In some embodiments, before acquiring the tag data sent by the electronic tag reader carried by the person, the method further includes:
acquiring the input identity information of the personnel;
identifying binding identity information corresponding to the ID of the electronic tag reader-writer carried by the personnel;
and under the condition that the input identity information is matched with the binding identity information corresponding to the ID of the electronic tag reader-writer, executing the step of acquiring tag data sent by the electronic tag reader-writer carried by personnel.
In some embodiments, the determining whether to perform the warning for the person based on the positioning information and the binding identity information of the person includes:
determining whether the personnel has the security authority of entering the security control area or not based on the binding identity information of the personnel and the preset corresponding relationship between the binding identity information and the security authority;
and if the personnel do not have the safety permission to enter the safety control area, and the positioning information of the personnel indicates that the personnel is close to or enters the safety control area, and early warning is carried out on the personnel.
In a second aspect of the embodiments of the present disclosure, a method for managing personnel based on an electronic tag technology is provided, where the method is applied to an electronic tag reader-writer carried by personnel, and includes:
when any electronic tag arranged in a safety control area is read, the tag data of the electronic tag is sent to a server, so that the server determines the positioning information of the personnel based on the tag data.
In some embodiments, the above method further comprises:
when a person carrying the electronic tag reader-writer enters a management area, the electronic tag reader-writer is set to be in an activated state so as to establish connection with the server, and the management area comprises at least one safety control area.
In some embodiments, the above method further comprises:
when any electronic tag distributed in a safety control area is read, the electronic tag reader-writer is set to be in a wake-up state;
and when any electronic tag arranged in the safety control area cannot be read, setting the electronic tag reader-writer to be in a dormant state.
In some embodiments, the electronic tag is an RFID tag.
In a third aspect of the embodiments of the present disclosure, there is provided a personnel management apparatus based on electronic tag technology, where the apparatus is applied to a server, and the apparatus includes:
the system comprises an acquisition module, a safety management and control module and a management module, wherein the acquisition module is used for acquiring tag data sent by an electronic tag reader-writer carried by personnel, and the tag data is obtained by reading any electronic tag distributed in a safety management and control area by the electronic tag reader-writer;
a location module to determine location information of the person based on the tag data;
and the early warning module is used for determining whether to carry out early warning on the personnel based on the positioning information and the binding identity information of the personnel.
In a fourth aspect of the embodiments of the present disclosure, a personnel management apparatus based on an electronic tag technology is provided, where the apparatus is applied to an electronic tag reader-writer carried by a person, and includes:
and the sending module is used for setting the electronic tag reader-writer to be in an activated state when a person carrying the electronic tag reader-writer enters a management area so as to establish connection with the server, and the management area comprises at least one safety control area.
In a fifth aspect of the embodiments of the present disclosure, a server is provided, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor implements the steps corresponding to the first aspect when executing the computer program.
In a sixth aspect of the embodiments of the present disclosure, there is provided an electronic tag reader-writer, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps corresponding to the second aspect when executing the computer program.
A seventh aspect of the embodiments of the present disclosure provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the steps corresponding to the first aspect or the second aspect.
Advantageous effects
Compared with the prior art, the embodiment of the disclosure has the advantages that at least: through setting up in the electronic tags read write line of staff's frock or personal equipment to and set up in the electronic tags in early warning area, can in time early warning, reduce use cost greatly.
Drawings
To more clearly illustrate the technical solutions in the embodiments of the present disclosure, the drawings needed for the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without inventive efforts.
Fig. 1 is a schematic diagram of an application scenario of a person management method based on electronic tag technology according to an embodiment of the present disclosure;
fig. 2 is a flowchart of some embodiments of a person management method based on electronic tag technology applied to a server according to an embodiment of the present disclosure;
FIG. 3 is a flow chart of further embodiments of a person management method based on electronic tag technology applied to a server according to the embodiments of the present disclosure;
fig. 4 is a flowchart of some embodiments of a person management method based on electronic tag technology, applied to an electronic tag reader/writer according to an embodiment of the present disclosure;
fig. 5 is a schematic diagram of a simple structure of a person management device based on electronic tag technology applied to a server according to an embodiment of the present disclosure;
fig. 6 is a schematic diagram of a simple structure of a personnel management device based on electronic tag technology, which is applied to an electronic tag reader-writer according to an embodiment of the present disclosure;
fig. 7 is a schematic diagram of an electronic device provided in accordance with an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. It should be understood that the drawings and the embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be further noted that, for the convenience of description, only the portions relevant to the present disclosure are shown in the drawings. The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different systems, devices, modules or units, and are not used for limiting the order or interdependence of the functions executed by the systems, devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a schematic diagram of one application scenario of a person management method based on electronic tag technology according to some embodiments of the present disclosure.
In the application scenario of fig. 1, a server 101 and an electronic tag reader/writer 102 are included.
Firstly, a server 101 may obtain tag data sent by an electronic tag reader carried by a person, where the tag data is obtained by the electronic tag reader reading any electronic tag arranged in a security control area;
secondly, the server 101 may determine the location information of the person based on the tag data;
finally, the server 101 may determine whether to perform an early warning for the person based on the positioning information and the bound identity information of the person.
In a second aspect, when any electronic tag deployed in a security management and control area is read, the electronic tag reader/writer 102 may send tag data of the electronic tag to a server, so that the server determines location information of the person based on the tag data.
The server 101 may be hardware or software. When the server 101 is hardware, it may be implemented as a distributed cluster composed of a plurality of servers or terminal devices, or may be implemented as a single server or a single terminal device. When the server 101 is embodied as software, it may be installed in the above-listed hardware devices. It may be implemented, for example, as multiple software or software modules to provide distributed services, or as a single software or software module. The electronic tag reader/writer 102 may be an existing or future invented device for reading (or reading and writing) electronic tags. Are not particularly limited herein.
It should be understood that the numbers of the servers 101 and the electronic tag readers/writers 102 in fig. 1 are merely illustrative. Any number of servers 101 and electronic tag readers 102 are provided as required for implementation.
With continued reference to fig. 2, a flow 200 of some embodiments of a person management method based on electronic label technology according to the present disclosure is shown. The method may be performed by the server 101 in fig. 1. The personnel management method based on the electronic tag technology comprises the following steps:
step 201, obtaining tag data sent by an electronic tag reader-writer carried by a person, wherein the tag data is obtained by the electronic tag reader-writer reading any electronic tag distributed in a safety control area.
In some embodiments, an execution main body (for example, the server 101 shown in fig. 1) of the personnel management method based on the electronic tag technology may establish a communication connection with an electronic tag reader-writer carried by a person, and then obtain tag data sent by the electronic tag reader-writer 102 carried by the person, where the tag data is obtained by the electronic tag reader-writer reading any electronic tag arranged in a security management and control area. The tag data may refer to data related to the electronic tag read by the electronic tag reader/writer 102. As an example, the tag data may include identification information of a security management and control area corresponding to the electronic tag, and may further include coordinate information corresponding to the electronic tag. The safety control area can be an area with certain potential safety hazards and needing to prevent irrelevant people from approaching, the method can be applied to a plant needing to be managed, and the plant can comprise at least one safety control area.
In some optional implementation manners of some embodiments, before acquiring the tag data sent by the electronic tag reader carried by a person, the method further includes: acquiring the input identity information of the personnel; identifying binding Identity information corresponding to an ID (Identity document) of an electronic tag reader-writer carried by the personnel; and under the condition that the input identity information is matched with the binding identity information corresponding to the ID of the electronic tag reader-writer, executing the step of acquiring tag data sent by the electronic tag reader-writer carried by personnel.
When the staff arrives at the post, identity information needs to be input, and whether the staff wears matched tools or wearing equipment with the electronic tag reader-writer or not is judged. And if the matching is successful, the user is permitted to enter the factory building. If not, then not allow to enter the factory building or carry out the unmatched early warning of identity. The input identity information can be obtained by scanning a work card, face recognition, fingerprint input and the like when the staff arrives at the post. It should be noted that each electronic tag reader/writer corresponds to a unique ID, and each binding identity information is also unique. The binding identity information may refer to identity information stored in a database corresponding to the ID of the electronic tag reader.
Step 202, determining location information of the person based on the tag data.
In some embodiments, the performing agent may determine location information of the person based on the tag data. The arrangement position of the electronic tags is fixed, the tag data can include position information of the electronic tags, the positioning information can refer to positioning information of personnel determined according to the position information in the tag data and the scanning distance of the electronic tag reader-writer, and the positioning information can indicate that the personnel approach or enter a safety control area. For example, the location of the electronic tag may be the center of a security control area, the center of the security control area is 10 meters away from the edge, and the scanning distance of the electronic tag reader-writer is 12 meters, which indicates that the person is close to but does not enter the security control area. In other implementations, the positioning information may also refer to the relative position information of the person and the electronic tag obtained through calculation according to the tag data. The calculation may be performed by a preset formula, and is set as needed, which is not limited herein.
Step 203, determining whether to perform early warning for the personnel based on the positioning information and the binding identity information of the personnel.
In some embodiments, the executing entity may determine whether to perform the warning for the person based on the positioning information and the binding identity information of the person according to the following steps:
in the first step, the execution subject may determine whether the person has a security right to enter the security management and control area based on the binding identity information of the person and a preset correspondence between the binding identity information and the security right. Different security control areas can be accessed by people with different security permissions, so that the security permission corresponding to the binding identity information corresponding to the electronic tag reader-writer needs to be judged at first, and whether the people can access the security control areas is determined. If the corresponding authority is possessed, early warning is not executed. And if the corresponding authority does not exist, continuing to judge based on the second step.
And secondly, if the personnel do not have the safety permission to enter the safety control area and the positioning information of the personnel indicates that the personnel are close to or enter the safety control area, the execution main body can perform early warning on the personnel.
In some optional implementations of some embodiments, the warning may be performed by a preset sound playing device.
In other optional implementations of some embodiments, security personnel near the security administration area may be notified to perform the process.
Otherwise, the early warning is not executed.
In some optional implementation manners of some embodiments, approaching or entering the safety control area may refer to whether a distance between a person and the safety control area is smaller than a preset distance threshold corresponding to the safety control area. The distance threshold may refer to a determination distance limit value of the safety control area for its own safety range. It is noted that the distance thresholds for different zones of security may be different. Preferably, the distance between the person and the safety control area can be a distance in the horizontal direction, a distance in the vertical direction, or a straight distance, and is set as required.
The beneficial effects of one of the above embodiments of the present disclosure at least include: through setting up in the electronic tags read write line of staff's frock or personal equipment to and set up in the electronic tags in early warning area, in time the early warning, reduce use cost greatly.
With continued reference to fig. 3, a flow 300 of further embodiments of a people management method based on electronic label technology according to the present disclosure is shown, which may be performed by the server 101 in fig. 1. The personnel management method based on the electronic tag technology comprises the following steps:
and 301, acquiring the input identity information of the personnel.
And step 302, identifying binding identity information corresponding to the ID of the electronic tag reader-writer carried by the personnel.
Step 303, acquiring tag data sent by the electronic tag reader-writer carried by a person under the condition that the input identity information matches with the binding identity information corresponding to the ID of the electronic tag reader-writer.
Step 304, determining location information of the person based on the tag data.
Step 305, determining whether the personnel has the security authority to enter the security control area based on the binding identity information of the personnel and a preset corresponding relationship between the binding identity information and the security authority.
And 306, if the personnel does not have the security permission to enter the security control area and the positioning information of the personnel indicates that the personnel approaches or enters the security control area, carrying out early warning on the personnel.
In some embodiments, the detailed implementation and technical effects of steps 301 to 306 may refer to steps 201 to 203 in those embodiments corresponding to fig. 2, which are not described herein again.
With continued reference to fig. 4, a flow 400 of some embodiments of a people management method based on electronic label technology in accordance with the present disclosure is shown. The method may be performed by the electronic tag reader 102 in fig. 1. The personnel management method based on the electronic tag technology comprises the following steps:
step 401, when any electronic tag arranged in a safety management and control area is read, sending tag data of the electronic tag to a server, so that the server determines positioning information of the personnel based on the tag data.
In some embodiments, when any electronic tag deployed in a security management and control area is read, the executing body may send tag data of the electronic tag to a server, so that the server determines the positioning information of the person based on the tag data. The electronic tag may refer to a tag in which information related to a security control area is recorded.
In some optional implementations of some embodiments, the electronic tag may be an RFID (Radio Frequency Identification) tag.
In some embodiments, when a person carrying the electronic tag reader enters a management area, the electronic tag reader is set to an activated state to establish a connection with the server, and the management area includes at least one security management and control area. The management area can be a comprehensive area such as a factory building. The electronic tag reader can comprise an activated state, a wake-up state, a sleep state, an off state and the like. The activation state can indicate that the electronic tag reader-writer is started and is in a working state. At this time, the electronic tag reader-writer may establish communication with a corresponding server and perform data transmission. The off state may indicate that the electronic tag reader is in an off state, the connection with the corresponding server is disconnected, and other operations than indicating the activation instruction cannot be responded. The wake-up state can indicate a state that the electronic tag reader-writer can read the electronic tag in a reading range in an activated state, and the state is certainly connected with the server and transmits data, and is converted into a sleep state under the condition that the electronic tag cannot be read in the reading range. The sleep state may indicate a state in which the electronic tag reader/writer cannot read the electronic tag within a reading range in an activated state, and at this time, the electronic tag reader/writer disconnects from the server, but is switched to an awake state in a case where the electronic tag can be detected within the reading range.
In some optional implementation manners of some embodiments, when any electronic tag arranged in a security management and control area is read, the execution main body may set the electronic tag reader-writer to an awake state; when any electronic tag laid in the security control area cannot be read, the execution main body may set the electronic tag reader to a sleep state.
The beneficial effects of one of the above embodiments of the present disclosure at least include: by adjusting the state of the electronic tag reader-writer under different conditions, the power consumption can be further saved.
All the above optional technical solutions may be combined arbitrarily to form optional embodiments of the present application, and are not described herein again.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
With further reference to fig. 5, as an implementation of the above-described methods for the above-described figures, the present disclosure provides some embodiments of a people management apparatus based on electronic label technology, which correspond to those method embodiments described above with reference to fig. 2.
As shown in fig. 5, the person management apparatus 500 based on electronic tag technology of some embodiments includes:
the acquiring module 501 is configured to acquire tag data sent by an electronic tag reader carried by a person, where the tag data is acquired by the electronic tag reader reading any electronic tag arranged in a security control area.
A location module 502 for determining location information of the person based on the tag data.
An early warning module 503, configured to determine whether to perform early warning on the person based on the positioning information and the binding identity information of the person.
In some optional implementations of some embodiments, the staff management apparatus 500 based on electronic tag technology further includes: the second acquisition module is used for acquiring the input identity information of the personnel; the identification module is used for identifying binding identity information corresponding to the ID of the electronic tag reader-writer carried by the personnel; and the execution module is used for executing the step of acquiring the tag data sent by the electronic tag reader-writer carried by personnel under the condition that the input identity information is matched with the binding identity information corresponding to the ID of the electronic tag reader-writer.
In some optional implementations of some embodiments, the early warning module 503 is further configured to: determining whether the personnel has the security authority of entering the security control area or not based on the binding identity information of the personnel and the preset corresponding relationship between the binding identity information and the security authority; and if the personnel do not have the safety permission to enter the safety control area, and the positioning information of the personnel indicates that the personnel is close to or enters the safety control area, and early warning is carried out on the personnel.
It is understood that the modules recited in the apparatus 500 correspond to the various steps in the method described with reference to fig. 2. Thus, the operations, features and resulting advantages described above for the method are also applicable to the apparatus 500 and the modules included therein, and are not described herein again.
With further reference to fig. 6, as an implementation of the above-described methods for the above-described figures, the present disclosure provides some embodiments of a people management apparatus based on electronic label technology, which correspond to those method embodiments described above with reference to fig. 4.
As shown in fig. 6, the person management apparatus 600 based on electronic tag technology according to some embodiments includes:
a sending module 601, configured to set the electronic tag reader-writer to an activated state when a person carrying the electronic tag reader-writer enters a management area, so as to establish a connection with the server, where the management area includes at least one security management and control area.
In some optional implementations of some embodiments, the staff management apparatus 600 based on electronic tag technology further includes: and the activation module is used for setting the electronic tag reader-writer to be in an activated state when a person carrying the electronic tag reader-writer enters a management area so as to establish connection with the server, and the management area comprises at least one safety control area.
In some optional implementations of some embodiments, the staff management apparatus 600 based on electronic tag technology further includes: the system comprises a wake-up module, a security management and control module and a security management and control module, wherein the wake-up module is used for setting an electronic tag reader-writer to be in a wake-up state when any electronic tag arranged in a security management and control area is read; and the dormancy module is used for setting the electronic tag reader-writer to be in a dormant state when any electronic tag arranged in the safety control area cannot be read.
In some optional implementations of some embodiments, the electronic tag is an RFID tag.
It is understood that the modules recited in the apparatus 600 correspond to the various steps in the method described with reference to fig. 4. Thus, the operations, features and resulting advantages described above for the method are also applicable to the apparatus 600 and the modules included therein, and are not described herein again.
As shown in fig. 7, electronic device 700 may include a processing means (e.g., central processing unit, graphics processor, etc.) 701 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM) 702 or a program loaded from a storage means 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data necessary for the operation of the electronic apparatus 700 are also stored. The processing device 701, the ROM 702, and the RAM 703 are connected to each other by a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
Generally, the following devices may be connected to the I/O interface 705: input devices 706 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, or the like; an output device 707 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 708, including, for example, magnetic tape, hard disk, etc.; and a communication device 709. The communication means 709 may allow the electronic device 700 to communicate with other devices, wireless or wired, to exchange data. While fig. 7 illustrates an electronic device 700 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may be alternatively implemented or provided. Each block shown in fig. 7 may represent one device or may represent multiple devices as desired.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer-readable medium, the computer program comprising program code for performing the method illustrated by the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network via communications device 709, or installed from storage device 708, or installed from ROM 702. The computer program, when executed by the processing device 701, performs the above-described functions defined in the methods of some embodiments of the present disclosure.
It should be noted that the computer readable medium described above in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the apparatus; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs, which when executed by the electronic device, cause the electronic device to perform the steps corresponding to the flow 200, the flow 300, or the flow 400.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in some embodiments of the present disclosure may be implemented by software or hardware. The modules described may also be provided in a processor.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), complex Programmable Logic Devices (CPLDs), and the like.
In some embodiments, the aforementioned electronic device may be a server, including a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor implements the steps corresponding to the flow 200 or the flow 300 when executing the computer program.
In some embodiments, the electronic device may also be an electronic tag reader/writer, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor implements the steps corresponding to the flow 400 when executing the computer program.
In some optional implementations of some embodiments, the electronic tag reader is disposed on clothing, a hat, shoes, or a wearing device of a person. As an example, the wearable device may be a bracelet, for example.
In some optional implementation manners of some embodiments, the electronic tag reader/writer performs charging based on a wireless charging manner or a contact charging manner.
In some optional implementations of some embodiments, the number of the electronic tag readers provided in clothing, hat, shoes or wearing equipment of a person is greater than or equal to 1.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.

Claims (14)

1. A personnel management method based on electronic tag technology is characterized in that the method is applied to a server and comprises the following steps:
the method comprises the steps that tag data sent by an electronic tag reader-writer carried by personnel are obtained, wherein the tag data are obtained by the electronic tag reader-writer reading any electronic tag distributed in a safety control area;
determining location information for the person based on the tag data;
and determining whether to perform early warning for the personnel based on the positioning information and the binding identity information of the personnel.
2. The method according to claim 1, wherein before the obtaining tag data sent by an electronic tag reader carried by a person, the method further comprises:
acquiring the input identity information of the personnel;
identifying binding identity information corresponding to the ID of the electronic tag reader-writer carried by the personnel;
and under the condition that the input identity information is matched with the binding identity information corresponding to the ID of the electronic tag reader-writer, executing the step of acquiring tag data sent by the electronic tag reader-writer carried by personnel.
3. The method of claim 1, wherein determining whether to warn the person based on the location information and the binding identity information of the person comprises:
determining whether the personnel has the security authority of entering the security control area or not based on the binding identity information of the personnel and the preset corresponding relation between the binding identity information and the security authority;
and if the personnel do not have the safety permission to enter the safety control area, and the positioning information of the personnel indicates that the personnel approach or enter the safety control area, early warning is carried out on the personnel.
4. A personnel management method based on electronic tag technology is characterized in that the method is applied to an electronic tag reader-writer carried by personnel, and comprises the following steps:
when any electronic tag arranged in a safety management and control area is read, the tag data of the electronic tag is sent to a server, so that the server determines the positioning information of the personnel based on the tag data.
5. The method of claim 4, further comprising:
when a person carrying the electronic tag reader-writer enters a management area, the electronic tag reader-writer is set to be in an activated state so as to establish connection with the server, and the management area comprises at least one safety control area.
6. The method of claim 4, further comprising:
when any electronic tag arranged in a safety control area is read, the electronic tag reader-writer is set to be in an awakening state;
and when any electronic tag arranged in the safety control area cannot be read, setting the electronic tag reader-writer to be in a dormant state.
7. A method according to any one of claims 4 to 6, wherein the electronic tag is an RFID tag.
8. A personnel management device based on electronic tag technology is characterized in that the device is applied to a server and comprises:
the system comprises an acquisition module, a security management and control module and a security management and control module, wherein the acquisition module is used for acquiring tag data sent by an electronic tag reader-writer carried by personnel, and the tag data is acquired by reading any electronic tag arranged in a security management and control area by the electronic tag reader-writer;
a location module to determine location information of the person based on the tag data;
and the early warning module is used for determining whether to carry out early warning on the personnel based on the positioning information and the binding identity information of the personnel.
9. The personnel management device based on the electronic tag technology is characterized in that the device is applied to an electronic tag reader-writer carried by personnel, and comprises:
and the sending module is used for setting the electronic tag reader-writer to be in an activated state when a person carrying the electronic tag reader-writer enters a management area so as to establish connection with the server, and the management area comprises at least one safety control area.
10. A server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1 to 3 are implemented when the computer program is executed by the processor.
11. An electronic tag reader writer comprising a memory, a processor and a computer program stored in said memory and executable on said processor, characterized in that said processor implements the steps of the method according to any of claims 4 to 7 when executing said computer program.
12. The electronic tag reader-writer according to claim 11, wherein the electronic tag reader-writer is provided to clothing, a hat, shoes, or a wearing device of a person.
13. The electronic tag reader-writer according to claim 11, wherein the electronic tag reader-writer performs charging based on a wireless charging mode or a contact charging mode.
14. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 3, or the steps of the method according to any one of claims 4 to 7.
CN202210895479.4A 2022-07-27 2022-07-27 Personnel management method and device based on electronic tag technology and storage medium Pending CN115293307A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210895479.4A CN115293307A (en) 2022-07-27 2022-07-27 Personnel management method and device based on electronic tag technology and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210895479.4A CN115293307A (en) 2022-07-27 2022-07-27 Personnel management method and device based on electronic tag technology and storage medium

Publications (1)

Publication Number Publication Date
CN115293307A true CN115293307A (en) 2022-11-04

Family

ID=83824287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210895479.4A Pending CN115293307A (en) 2022-07-27 2022-07-27 Personnel management method and device based on electronic tag technology and storage medium

Country Status (1)

Country Link
CN (1) CN115293307A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI824949B (en) * 2023-03-08 2023-12-01 振曜科技股份有限公司 Storage box with electronic label

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI824949B (en) * 2023-03-08 2023-12-01 振曜科技股份有限公司 Storage box with electronic label

Similar Documents

Publication Publication Date Title
TWI599990B (en) Method, system and communication terminal for patrol with scanning tags
US7849041B2 (en) Intent prediction and response employing sensing, networking, and communication among distributed devices
CN107689871B (en) Internet of things mobile terminal with identity verification and person verification integrated verification method
JP2002157040A (en) User authentication method and user authentication system using radio tag
KR20170100473A (en) System and method for location-based security
CN105095684A (en) Automatic triaging method for hospital
KR20220159925A (en) Sub reader and sub reader control method
JP2016116130A (en) Transmission/reception system
CN115293307A (en) Personnel management method and device based on electronic tag technology and storage medium
CN104537722A (en) Method and equipment capable of simultaneously checking attendance of multiple persons
CN104091188A (en) Wearable equipment and smart card system
CN109993250A (en) Elevator maintenance management system
CN107172068A (en) Information sending control method, server, system, device and storage medium
CN107358708A (en) A kind of intelligence community gate control system
CN204423483U (en) A kind of gate control system
CN215599697U (en) Park payment system
CN210466482U (en) Noninductive attendance device based on Internet of things
CN210534865U (en) Sign-in system
CN114047897A (en) Detection information display method and device, electronic equipment and computer readable medium
CN109408127B (en) Chip system loading method and chip card
Mazumdar et al. NFC-based mobile application for student attendance in institution of higher learning
CN105405087A (en) Hospital automatic triage method
CN205750905U (en) A kind of attendance checking system based on Android flat board
CN214412773U (en) Safety encryption system
CN102222248A (en) Dynamic monitoring method and system for RFID (radio frequency identification device) data reading-writing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination