CN115543237A - Intelligent printing remote control system and method based on Internet of things - Google Patents

Intelligent printing remote control system and method based on Internet of things Download PDF

Info

Publication number
CN115543237A
CN115543237A CN202211476649.1A CN202211476649A CN115543237A CN 115543237 A CN115543237 A CN 115543237A CN 202211476649 A CN202211476649 A CN 202211476649A CN 115543237 A CN115543237 A CN 115543237A
Authority
CN
China
Prior art keywords
printing
request
user
time
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211476649.1A
Other languages
Chinese (zh)
Other versions
CN115543237B (en
Inventor
杨兴中
黄利
周雨桐
张彦伟
谢府锦
陈恩占
储晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Kungfu Bean Information Technology Co ltd
Original Assignee
Nanjing Kungfu Bean Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Kungfu Bean Information Technology Co ltd filed Critical Nanjing Kungfu Bean Information Technology Co ltd
Priority to CN202211476649.1A priority Critical patent/CN115543237B/en
Publication of CN115543237A publication Critical patent/CN115543237A/en
Application granted granted Critical
Publication of CN115543237B publication Critical patent/CN115543237B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1203Improving or facilitating administration, e.g. print management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1259Print job monitoring, e.g. job status
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1285Remote printer device, e.g. being remote from client or server

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

The invention relates to the technical field of remote control of printing equipment, in particular to an intelligent remote printing control system and method based on the Internet of things, which comprises the following steps: respectively combing information of user printing request sequences corresponding to certain printing equipment; preliminarily judging whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests, and extracting risk time periods; respectively capturing the expected time when a first user terminal and a second user terminal which initiate a first user printing request and a second user printing request in each request chain reach the corresponding target printing equipment; whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests is verified; and intelligently reminding user terminals related to privacy leakage risks in the user printing request sequence, and adjusting the user printing request sequence based on feedback results of the user terminals on the intelligent reminding.

Description

Intelligent printing remote control system and method based on Internet of things
Technical Field
The invention relates to the technical field of remote control of printing equipment, in particular to an intelligent remote printing control system and method based on the Internet of things.
Background
For remote printing equipment, the printing function limited by a local area network is thoroughly broken through, printing can be carried out at any time and any place as long as a network exists, the printing is realized by software and hardware together, the hardware (printer) is connected to a server, and the printing can be realized by remote access through the software;
however, the problem of privacy hidden troubles is also caused, because in the process of realizing remote printing, because a printer has a certain distance with a printing area and in the intensive printing period, concentrated printing often causes the problems of delayed printing and the like because of numerous printing tasks, and the printer cannot immediately go to a printing position to take a printing draft after sending the printing task; the printing draft stored at the paper outlet is easily acquired by other people, and the printing leakage is caused.
Disclosure of Invention
The invention aims to provide an intelligent printing remote control system and method based on the Internet of things, and aims to solve the problems in the background technology.
In order to solve the technical problems, the invention provides the following technical scheme: an intelligent printing remote control method based on the Internet of things comprises the following steps:
step S100: acquiring geographical position information of a user who completes registration and initiates a printing request through a mobile terminal, recommending all alternative printing devices located in a preset range to the user by taking the geographical position of the user as a center, and selecting one printing device from all the alternative printing devices as a target printing device by the user and completing connection;
step S200: sequencing all user printing requests received by certain printing equipment according to request initiating time to obtain a user printing request sequence corresponding to certain printing equipment; combing information of each user printing request in the user printing request sequence;
step S300: based on the information obtained by combing the printing requests, preliminarily judging whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests, and extracting a risk period;
step S400: setting the request chain in which the request initiation time is the first user printing request and the request initiation time is the second user printing request; respectively capturing the estimated time when a first user terminal and a second user terminal which initiate a first user printing request and a second user printing request reach corresponding target printing equipment;
step S500: based on the overlapping condition between the predicted time corresponding to the first user terminal and the second user terminal; whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests is verified;
step S600: and based on the verification result, intelligently reminding user terminals involved in privacy leakage risks in the user printing request sequence, and adjusting the user printing request sequence based on feedback results of the user terminals on the intelligent reminding.
Further, step S200 includes:
step S201: extracting user print request sequences
Figure 57231DEST_PATH_IMAGE001
(ii) a Wherein the content of the first and second substances,
Figure 559887DEST_PATH_IMAGE002
respectively represent the 1 st, 2 nd,
Figure 802650DEST_PATH_IMAGE003
N user printing requests initiated to a certain printing device; capturing user print request sequences
Figure 572897DEST_PATH_IMAGE001
The request initiation time corresponding to the print request of each user
Figure 242913DEST_PATH_IMAGE004
The request initiation time corresponding to each user printing request
Figure 232866DEST_PATH_IMAGE004
Obtaining a request start response time sequence as the request start response time of a certain printing device to each user printing request; wherein, the first and the second end of the pipe are connected with each other,
Figure 13740DEST_PATH_IMAGE005
respectively representing a certain pair of printing apparatus
Figure 405538DEST_PATH_IMAGE002
Request start response time of (1);
the request start response time for extracting the printing request of each user is that on the premise that other printing requests do not exist or other printing requests exist by default, the printing equipment does not influence the current printing request when executing the other printing requests, namely, the current printing equipment belongs to an idle state by default when each printing request exists;
step S202: printing request sequence to user
Figure 512035DEST_PATH_IMAGE001
Capturing the target printing type and the target printing quantity of each user printing request; collecting performance state parameters and historical printing record data of a certain printing device, and capturing the corresponding required working time of the certain printing device when the certain printing device responds to and finishes other printing requests which are the same as or have the similarity greater than the similarity threshold value of each user printing request
Figure 989283DEST_PATH_IMAGE006
(ii) a Based on the request start response time of a certain printing device to each user printing request, the request response end time is calculated for each user printing request
Figure 573848DEST_PATH_IMAGE007
Wherein, in the step (A),
Figure 53109DEST_PATH_IMAGE008
further, step S300 includes:
step S301: if the ith user print request exists in the user print request sequence
Figure 330507DEST_PATH_IMAGE009
Request response end time of
Figure 29472DEST_PATH_IMAGE010
And the (i + 1) th user print request
Figure 417728DEST_PATH_IMAGE011
Request start response time of
Figure 518540DEST_PATH_IMAGE012
Satisfy the following requirements
Figure 701259DEST_PATH_IMAGE013
The preliminary judgment is made in
Figure 480996DEST_PATH_IMAGE009
And
Figure 282730DEST_PATH_IMAGE011
formed request chain
Figure 362682DEST_PATH_IMAGE014
No risk of privacy disclosure exists; extraction of
Figure 361643DEST_PATH_IMAGE015
As a chain of requests
Figure 159834DEST_PATH_IMAGE014
Hiding the existing risk period;
hiding the period of risk that exists, i.e. the printing device is performing a print request
Figure 765259DEST_PATH_IMAGE009
Thereafter, how long it takes for the print request to be received and started to be processed
Figure 699717DEST_PATH_IMAGE011
A corresponding time period during which the initiation of a print request is if it occurs
Figure 630764DEST_PATH_IMAGE009
The user arrives at the printing device more than initiating a print request
Figure 916252DEST_PATH_IMAGE011
The user arrives late at the printing device and is faced with the presence of the printing device based on the print request
Figure 59788DEST_PATH_IMAGE009
The printed file is initiated with a print request
Figure 114332DEST_PATH_IMAGE011
Is more likely to be seen by the user;
step S302: if the ith user print request exists in the user print request sequence
Figure 449236DEST_PATH_IMAGE009
Request response end time of
Figure 956441DEST_PATH_IMAGE010
And the (i + 1) th user print request
Figure 231565DEST_PATH_IMAGE011
Request start response time of
Figure 78298DEST_PATH_IMAGE012
To satisfy
Figure 147885DEST_PATH_IMAGE016
When it is determined preliminarily that
Figure 283331DEST_PATH_IMAGE009
And with
Figure 893304DEST_PATH_IMAGE011
Composed request chain
Figure 797806DEST_PATH_IMAGE014
In (2), there is a risk of privacy disclosure; extraction of
Figure 835032DEST_PATH_IMAGE017
As a chain of requests
Figure 956310DEST_PATH_IMAGE014
The period of risk present in;
ascertaining the period of risk present, meaning the print request
Figure 369974DEST_PATH_IMAGE011
The initiation time is when the printing device is executing a print request
Figure 128982DEST_PATH_IMAGE009
That is, the printing apparatus is receiving a print request
Figure 868268DEST_PATH_IMAGE011
Is not idle and therefore cannot be based on print requests
Figure 712727DEST_PATH_IMAGE011
The generation time of (2) is immediately responded to, and at the same time means that a print request is initiated
Figure 867765DEST_PATH_IMAGE011
The user executing the print request at the printing apparatus
Figure 871493DEST_PATH_IMAGE009
Can arrive at the printing device, i.e., means that the printing device is based on the print request
Figure 125888DEST_PATH_IMAGE009
Print outThe coming document is initiated to print request
Figure 582277DEST_PATH_IMAGE011
Is more likely to be seen by the user during this risk period;
because of the print request
Figure 711645DEST_PATH_IMAGE011
The method can not be implemented on the corresponding printing equipment immediately after the request is initiated, and the method needs to wait for the completion of the last printing request, namely the method means that the printing request is initiated
Figure 569880DEST_PATH_IMAGE011
Will be in a print request
Figure 260755DEST_PATH_IMAGE011
The printing apparatus is reached in advance to wait without completing.
Further, step S400:
step S401: respectively extracting the corresponding geographical position of each user printing request when the request is initiated in each request chain without privacy leakage risk, and respectively acquiring all passing routes from the geographical position to the corresponding target printing equipment; capturing the real-time geographic positions of the first user terminal and the second user terminal in each request chain respectively every interval unit capturing time length;
step S402: when the user terminal is caught in a certain unit catching time length, the user terminal is always positioned on a certain passing route, the relative distance between the user terminal and the corresponding target printing equipment presents a general shortening trend, and the certain passing route is set as a target passing route selected by the user terminal; the user terminals comprise a first user terminal and a second user terminal;
step S403: capturing the corresponding time when a certain unit capturing duration is finished, setting the time as the starting time of the user terminal starting to go to the target printing equipment, and simultaneously capturing the average speed of the user terminal in the certain unit capturing duration; and obtaining the time length required by the user terminal to actually reach the target printing equipment based on the target passing route and the average speed, and obtaining the estimated time when the user terminal reaches the target printing equipment based on the time length and the starting time.
Further, step S500 includes:
step S501: extracting the predicted time when the first user terminal reaches the corresponding target printing equipment for a certain request chain which is preliminarily judged to have no privacy leakage risk
Figure 204440DEST_PATH_IMAGE018
Estimated time when the second user terminal arrives at the corresponding target printing apparatus
Figure 373385DEST_PATH_IMAGE019
(ii) a Setting the hidden risk time interval between the first user printing request and the second user printing request in a certain request chain as
Figure 86126DEST_PATH_IMAGE020
Step S502: if it is
Figure 947903DEST_PATH_IMAGE021
Figure 644463DEST_PATH_IMAGE022
And is and
Figure 867632DEST_PATH_IMAGE023
judging that the verification result of a certain request chain is that privacy leakage risks exist; if it is
Figure 700459DEST_PATH_IMAGE021
Figure 733137DEST_PATH_IMAGE022
And is made of
Figure 651415DEST_PATH_IMAGE024
And judging that the verification result of a certain request chain is that no privacy leakage risk exists.
Further, step S500 further includes:
step S503: extracting the predicted time when the first user terminal reaches the corresponding target printing equipment for a certain request chain which is preliminarily judged to have the privacy leakage risk
Figure 490058DEST_PATH_IMAGE018
Estimated time when the second user terminal arrives at the corresponding target printing apparatus
Figure 52757DEST_PATH_IMAGE019
(ii) a Setting the risk time interval existing between the printing request of the first user and the printing request of the second user in a certain request chain as
Figure 380970DEST_PATH_IMAGE020
Step S504: if it is
Figure 396331DEST_PATH_IMAGE025
And is and
Figure 100982DEST_PATH_IMAGE026
judging that the verification result of a certain request chain is that no privacy leakage risk exists; if it is
Figure 16723DEST_PATH_IMAGE022
Or is or
Figure 515837DEST_PATH_IMAGE025
And is made of
Figure 284073DEST_PATH_IMAGE027
And judging that the verification result of a certain request chain is the privacy leakage risk.
Further, step S600 includes:
step S601: extracting a first user terminal from each request chain with privacy leakage risks displayed in the verification result, and sending an intelligent prompt with privacy leakage risks to the first user terminal;
step S602: prompting a printing sequence which can be delayed to each first user terminal or delaying the request starting response time, and adjusting the user printing request sequence based on the feedback result of each first user terminal;
in order to solve the problem of privacy leakage of users, a storage box can be arranged at the paper outlet, but the phenomenon of overlarge storage burden often occurs, because the printing types are various, and a single user can possibly print dozens of paper for the printing of files, so that the storage box is not practical to be arranged at the paper outlet in the actual application process, and the method for coordinating the printing requirements of the user and the actual operation of printing equipment is the most efficient way.
In order to better realize the method, an intelligent printing remote control system based on the Internet of things is further provided, and the system comprises an equipment connection management module, an information combing module, a privacy leakage risk judgment module, a predicted time management module, a privacy leakage risk checking module and a sequence intelligent adjustment module;
the device connection management module is used for acquiring geographical position information of a user who completes registration and initiates a printing request through the mobile terminal, recommending all alternative printing devices located in a preset range to the user by taking the geographical position of the user as a center, and selecting one printing device from all the alternative printing devices as a target printing device by the user and completing connection;
the information combing module is used for sequencing all the user printing requests received by each printing device according to the request initiating time to obtain a user printing request sequence; combing information of each user printing request in the user printing request sequence;
the privacy leakage risk judging module is used for receiving the data in the information combing module, preliminarily judging whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests and extracting a risk time period;
the estimated time management module is used for predicting the time when the first user terminal corresponding to the first user printing request with the request initiation time in each request chain reaches the corresponding target printing equipment; the second user terminal is used for predicting the time when the second user terminal corresponding to the second user printing request with the later initiating time in each request chain reaches the corresponding target printing equipment;
the privacy leakage risk checking module is used for receiving the data in the estimated time management module and checking whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests;
and the sequence intelligent adjusting module is used for receiving the data in the privacy leakage risk checking module, intelligently reminding the user terminals related to the privacy leakage risk in the user printing request sequence, and adjusting the user printing request sequence based on the feedback result of each user terminal to the intelligent reminding.
Further, the privacy leakage risk judgment module comprises a preliminary judgment unit and a time interval extraction unit;
the preliminary judgment unit is used for receiving the data in the information combing module and preliminarily judging whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests;
and the time interval extraction unit is used for receiving the data in the preliminary judgment unit, extracting the existing risk time interval from the request chain with the privacy leakage risk, and extracting the hidden risk time interval from the request chain without the privacy leakage risk.
Compared with the prior art, the invention has the following beneficial effects: the invention can analyze the printing request sequence executed by the remote printing equipment, capture the printing request link with the risk of user privacy leakage, analyze the leakage risk of each risk time interval in each printing request link according to the actual condition of the user, intelligently remind the user, and correspondingly adjust the printing request sequence based on the real-time feedback information of the user, thereby realizing the privacy protection of the user.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic flow chart of an intelligent printing remote control method based on the Internet of things;
fig. 2 is a schematic structural diagram of an intelligent printing remote control system based on the internet of things.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, the present invention provides a technical solution: an intelligent printing remote control method based on the Internet of things comprises the following steps:
step S100: acquiring geographical position information of a user who completes registration and initiates a printing request through a mobile terminal, recommending all alternative printing devices located in a preset range to the user by taking the geographical position of the user as a center, and selecting one printing device from all the alternative printing devices as a target printing device by the user and completing connection;
step S200: sequencing all user printing requests received by certain printing equipment according to request initiating time to obtain a user printing request sequence corresponding to certain printing equipment; performing information combing on each user printing request in the user printing request sequence;
wherein, step S200 includes:
step S201: extracting user print request sequences
Figure 261256DEST_PATH_IMAGE001
(ii) a Wherein the content of the first and second substances,
Figure 798548DEST_PATH_IMAGE002
respectively represent the 1 st, 2 nd,
Figure 468564DEST_PATH_IMAGE003
N user printing requests initiated to a certain printing device; catchUser print request sequence
Figure 458517DEST_PATH_IMAGE001
The request initiation time corresponding to the print request of each user
Figure 239391DEST_PATH_IMAGE004
The request initiation time corresponding to each user printing request
Figure 129724DEST_PATH_IMAGE004
As a request start response time of a certain printing apparatus for each user print request, a request start response time series is obtained
Figure 970641DEST_PATH_IMAGE028
(ii) a Wherein, the first and the second end of the pipe are connected with each other,
Figure 447890DEST_PATH_IMAGE005
respectively representing a certain pair of printing apparatus
Figure 235718DEST_PATH_IMAGE002
Request start response time of (2);
step S202: printing request sequence to user
Figure 606656DEST_PATH_IMAGE001
Capturing the target printing type and the target printing quantity of each user printing request; collecting performance state parameters and historical printing record data of a certain printing device, and capturing the corresponding required working time of the certain printing device when the certain printing device responds to and finishes other printing requests which are the same as or have the similarity greater than the similarity threshold value of each user printing request
Figure 493841DEST_PATH_IMAGE006
(ii) a Based on the request start response time of a certain printing device to each user printing request, the request response end time is calculated for each user printing request
Figure 317440DEST_PATH_IMAGE007
In which,
Figure 581062DEST_PATH_IMAGE008
Step S300: based on the information obtained by combing the printing requests, preliminarily judging whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests, and extracting a risk period;
wherein, step S300 includes:
step S301: if the ith user printing request exists in the user printing request sequence
Figure 72087DEST_PATH_IMAGE009
Request response end time of
Figure 363128DEST_PATH_IMAGE010
And the (i + 1) th user print request
Figure 205182DEST_PATH_IMAGE011
Request start response time of
Figure 6916DEST_PATH_IMAGE012
To satisfy
Figure 86868DEST_PATH_IMAGE013
The preliminary judgment is made in
Figure 581434DEST_PATH_IMAGE009
And
Figure 379626DEST_PATH_IMAGE011
formed request chain
Figure 719471DEST_PATH_IMAGE014
No risk of privacy disclosure exists; extraction of
Figure 919509DEST_PATH_IMAGE015
As a chain of requests
Figure 912872DEST_PATH_IMAGE014
Hiding the existing risk period;
for example, there is a 1 st user print request
Figure 109279DEST_PATH_IMAGE029
The request response end time of (1) is 7
Figure 846291DEST_PATH_IMAGE030
The request start response time of (4) is 7; satisfy the requirements of
Figure 776201DEST_PATH_IMAGE031
Preliminary judgment is made in
Figure 471625DEST_PATH_IMAGE029
And
Figure 119775DEST_PATH_IMAGE030
formed request chain
Figure 457215DEST_PATH_IMAGE032
No risk of privacy disclosure exists;
extraction of
Figure 976052DEST_PATH_IMAGE033
As a chain of requests
Figure 373536DEST_PATH_IMAGE032
Hiding the existing risk period;
for example, initiate 1 st user print request
Figure 741938DEST_PATH_IMAGE029
And initiating a 2 nd user print request
Figure 617490DEST_PATH_IMAGE030
Are all at
Figure 521992DEST_PATH_IMAGE033
Internally to the same printing device and initiates a 2 nd user print request
Figure 559218DEST_PATH_IMAGE030
Before initiating the 1 st user print request
Figure 181961DEST_PATH_IMAGE029
The time of arrival of the user;
in the above case, the 2 nd user print request is initiated
Figure 798887DEST_PATH_IMAGE030
User presence see printing device print request based on 1 st user
Figure 682529DEST_PATH_IMAGE029
The possibility of printing the finished document; then the chain of requests
Figure 766023DEST_PATH_IMAGE032
In a period of time
Figure 735116DEST_PATH_IMAGE033
There is a risk of privacy disclosure in the system that requires the initiation of a 2 nd user print request
Figure 326372DEST_PATH_IMAGE030
The user (2) carries out reminding;
step S302: if the ith user print request exists in the user print request sequence
Figure 64521DEST_PATH_IMAGE009
Request response end time of
Figure 850074DEST_PATH_IMAGE010
And the (i + 1) th user print request
Figure 306463DEST_PATH_IMAGE011
Request start response time of
Figure 937296DEST_PATH_IMAGE012
Satisfy the following requirements
Figure 795530DEST_PATH_IMAGE016
When it is determined preliminarily that
Figure 486406DEST_PATH_IMAGE009
And
Figure 367774DEST_PATH_IMAGE011
formed request chain
Figure 97571DEST_PATH_IMAGE014
In (2), there is a risk of privacy disclosure; extraction of
Figure 13574DEST_PATH_IMAGE017
As a chain of requests
Figure 999985DEST_PATH_IMAGE014
The period of risk present in;
step S400: setting the request in each request chain, wherein the request initiation time is the first user printing request before, and the request initiation time is the second user printing request after; respectively capturing the estimated time when a first user terminal and a second user terminal which initiate a first user printing request and a second user printing request reach corresponding target printing equipment;
wherein, the step S400:
step S401: respectively extracting the corresponding geographical position of each user printing request when the request is initiated in each request chain without privacy leakage risk, and respectively acquiring all passing routes from the geographical position to the corresponding target printing equipment; capturing the real-time geographic positions of the first user terminal and the second user terminal in each request chain respectively every interval unit capturing time length;
step S402: when the user terminal is caught in a certain unit catching time length, the user terminal is always positioned on a certain passing route, the relative distance between the user terminal and the corresponding target printing equipment presents a general shortening trend, and the certain passing route is set as a target passing route selected by the user terminal; the user terminals comprise a first user terminal and a second user terminal;
step S403: capturing the corresponding time when a certain unit capturing time length is finished, setting the time as the starting time of the user terminal starting to go to the target printing equipment, and simultaneously capturing the average speed of the user terminal in the certain unit capturing time length; obtaining the time length required by the user terminal to actually reach the target printing equipment based on the target passing route and the average speed, and obtaining the estimated time when the user terminal reaches the target printing equipment based on the time length and the starting time;
step S500: based on the overlapping condition between the corresponding predicted time of the first user terminal and the second user terminal; whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests is verified;
wherein, step S500 includes:
step S501: extracting the predicted time when the first user terminal reaches the corresponding target printing equipment for a certain request chain which is preliminarily judged to have no privacy leakage risk
Figure 306332DEST_PATH_IMAGE018
Estimated time when the second user terminal arrives at the corresponding target printing apparatus
Figure 403601DEST_PATH_IMAGE019
(ii) a Setting the hidden risk time interval between the first user printing request and the second user printing request in a certain request chain as
Figure 846215DEST_PATH_IMAGE020
Step S502: if it is
Figure 3527DEST_PATH_IMAGE021
Figure 531591DEST_PATH_IMAGE022
And is and
Figure 698130DEST_PATH_IMAGE023
judging that the verification result of a certain request chain is that privacy leakage risks exist; if it is
Figure 753506DEST_PATH_IMAGE021
Figure 81719DEST_PATH_IMAGE022
And is and
Figure 97079DEST_PATH_IMAGE024
judging that the verification result of a certain request chain is that no privacy leakage risk exists;
step S503: extracting the predicted time when the first user terminal reaches the corresponding target printing equipment for a certain request chain which is preliminarily judged to have the privacy leakage risk
Figure 536151DEST_PATH_IMAGE018
Estimated time when the second user terminal arrives at the corresponding target printing apparatus
Figure 281253DEST_PATH_IMAGE019
(ii) a Setting the risk time interval existing between the printing request of the first user and the printing request of the second user in a certain request chain as
Figure 655734DEST_PATH_IMAGE020
Step S504: if it is
Figure 283024DEST_PATH_IMAGE025
And is and
Figure 401153DEST_PATH_IMAGE026
judging that the verification result of a certain request chain is that no privacy leakage risk exists; if it is
Figure 63078DEST_PATH_IMAGE022
Or is or
Figure 106995DEST_PATH_IMAGE025
And is and
Figure 956003DEST_PATH_IMAGE027
judging that the verification result of a certain request chain is that privacy leakage risks exist;
step S600: based on the verification result, intelligently reminding user terminals related to privacy leakage risks in the user printing request sequence, and adjusting the user printing request sequence based on feedback results of the user terminals to the intelligent reminding;
wherein, step S600 includes:
step S601: extracting the first user terminal from each request chain with the privacy leakage risk displayed in the verification result, and sending an intelligent prompt with the privacy leakage risk to the first user terminal;
step S602: and prompting the printing sequence capable of being delayed to each first user terminal or delaying the request starting response time, and adjusting the user printing request sequence based on the feedback result of each first user terminal.
In order to better realize the method, as shown in fig. 2, an intelligent printing remote control system based on the internet of things is further provided, and the system comprises an equipment connection management module, an information combing module, a privacy leakage risk judgment module, a predicted time management module, a privacy leakage risk checking module and a sequence intelligent adjustment module;
the device connection management module is used for acquiring geographical position information of a user who completes registration and initiates a printing request through the mobile terminal, recommending all alternative printing devices located in a preset range to the user by taking the geographical position of the user as a center, and selecting one printing device from all the alternative printing devices as a target printing device by the user and completing connection;
the information combing module is used for sequencing all the user printing requests received by each printing device according to the request initiation time to obtain a user printing request sequence; performing information combing on each user printing request in the user printing request sequence;
the privacy leakage risk judging module is used for receiving the data in the information combing module, preliminarily judging whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests and extracting a risk time period;
the privacy leakage risk judgment module comprises a preliminary judgment unit and a time period extraction unit;
the preliminary judgment unit is used for receiving the data in the information combing module and preliminarily judging whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests;
the time interval extraction unit is used for receiving the data in the preliminary judgment unit, extracting the existing risk time interval for the request chain with the privacy leakage risk, and extracting the hidden risk time interval for the request chain without the privacy leakage risk;
the expected time management module is used for predicting the time when the first user terminal corresponding to the first user printing request with the request initiation time in each request chain reaches the corresponding target printing equipment; the second user terminal is used for predicting the time when the second user terminal corresponding to the second user printing request with the later initiating time in each request chain reaches the corresponding target printing equipment;
the privacy leakage risk checking module is used for receiving the data in the estimated time management module and checking whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests;
and the sequence intelligent adjusting module is used for receiving the data in the privacy leakage risk checking module, intelligently reminding the user terminals related to the privacy leakage risk in the user printing request sequence, and adjusting the user printing request sequence based on the feedback result of each user terminal to the intelligent reminding.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. An intelligent printing remote control method based on the Internet of things is characterized by comprising the following steps:
step S100: acquiring geographical position information of a user who completes registration and initiates a printing request through a mobile terminal, recommending all alternative printing devices located in a preset range to the user by taking the geographical position of the user as a center, and selecting one printing device from all the alternative printing devices by the user as a target printing device to complete connection;
step S200: sequencing all user printing requests received by a certain printing device according to request initiation time to obtain a user printing request sequence corresponding to the certain printing device; performing information combing on each user printing request in the user printing request sequence;
step S300: based on the information obtained by combing the printing requests, preliminarily judging whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests, and extracting a risk period;
step S400: setting the request chain in which the request initiation time is the first user printing request and the request initiation time is the second user printing request; respectively capturing the expected time when a first user terminal and a second user terminal which initiate a first user printing request and a second user printing request reach the corresponding target printing equipment;
step S500: based on the overlapping condition between the predicted time corresponding to the first user terminal and the second user terminal; whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests is verified;
step S600: and intelligently reminding user terminals related to privacy leakage risks in the user printing request sequence based on a verification result, and adjusting the user printing request sequence based on a feedback result of each user terminal to the intelligent reminding.
2. The intelligent printing remote management and control method based on the internet of things according to claim 1, wherein the step S200 comprises:
step S201: extracting user print request sequences
Figure 36450DEST_PATH_IMAGE001
(ii) a Wherein the content of the first and second substances,
Figure 625694DEST_PATH_IMAGE002
respectively represent the 1 st, 2 nd,
Figure 936590DEST_PATH_IMAGE003
N user printing requests initiated to the certain printing equipment; capturing the user print request sequence
Figure 472744DEST_PATH_IMAGE001
The request initiation time corresponding to the print request of each user
Figure 818275DEST_PATH_IMAGE004
The request initiation time corresponding to each user printing request
Figure 47262DEST_PATH_IMAGE004
Obtaining a request start response time sequence as a request start response time of a certain printing device to the printing request of each user
Figure 845454DEST_PATH_IMAGE005
(ii) a Wherein, the first and the second end of the pipe are connected with each other,
Figure 949414DEST_PATH_IMAGE006
respectively representing said certain pair of printing apparatuses
Figure 149451DEST_PATH_IMAGE002
Request start response time of (2);
step S202: printing request sequence to user
Figure 549339DEST_PATH_IMAGE001
Capturing the target printing type and the target printing quantity of each user printing request; collecting performance state parameters and historical printing record data of a certain printing device, and capturing the corresponding required working time of the certain printing device when responding to and finishing other printing requests which are the same as or have similarity larger than a similarity threshold value with each user printing request
Figure 834827DEST_PATH_IMAGE007
(ii) a Based on the request start response time of the printing equipment to each user printing request, calculating the request response end time of each user printing request
Figure 775101DEST_PATH_IMAGE008
Wherein, in the process,
Figure 32907DEST_PATH_IMAGE009
3. the intelligent printing remote control method based on the internet of things of claim 2, wherein the step S300 comprises:
step S301: if the ith user print request exists in the user print request sequence
Figure 869276DEST_PATH_IMAGE010
Request response end time of
Figure 642060DEST_PATH_IMAGE011
And the (i + 1) th user print request
Figure 828103DEST_PATH_IMAGE012
Request start response time of
Figure 2732DEST_PATH_IMAGE013
Satisfy the following requirements
Figure 10003DEST_PATH_IMAGE014
Preliminary judgment is made in
Figure 270083DEST_PATH_IMAGE010
And with
Figure 755422DEST_PATH_IMAGE012
Composed request chain
Figure 784558DEST_PATH_IMAGE015
In, there is no risk of privacy disclosure; extraction of
Figure 962729DEST_PATH_IMAGE016
As a chain of requests
Figure 444526DEST_PATH_IMAGE015
Hiding the existing risk period;
step S302: if there is a request response end time of the ith user print request in the user print request sequence
Figure 61452DEST_PATH_IMAGE011
And the (i + 1) th user print request
Figure 318996DEST_PATH_IMAGE012
Request start response time of
Figure 792703DEST_PATH_IMAGE013
Satisfy the following requirements
Figure 637162DEST_PATH_IMAGE017
When it is determined preliminarily that
Figure 588938DEST_PATH_IMAGE010
And
Figure 468032DEST_PATH_IMAGE012
formed request chain
Figure 112640DEST_PATH_IMAGE015
In (1), there is a risk of privacy disclosure; extraction of
Figure 709974DEST_PATH_IMAGE018
As a chain of requests
Figure 199862DEST_PATH_IMAGE015
The period of risk present.
4. The intelligent printing remote control method based on the internet of things of claim 3, wherein the step S400:
step S401: respectively extracting the corresponding geographical position of each user printing request when the request is initiated in each request chain without privacy leakage risk, and respectively acquiring all passing routes from the geographical position to the corresponding target printing equipment; capturing the real-time geographic positions of the first user terminal and the second user terminal in each request chain respectively every interval unit capturing time length;
step S402: when the user terminal is caught within a certain unit catching time length, the user terminal is always positioned on a certain passing route, the relative distance between the user terminal and the corresponding target printing equipment presents a general shortening trend, and the certain passing route is set as a target passing route selected by the user terminal; the user terminal comprises a first user terminal and a second user terminal;
step S403: capturing the corresponding time when the certain unit capturing duration is finished, setting the time as the starting time of the user terminal for starting to the target printing equipment, and simultaneously capturing the average speed of the user terminal in the certain unit capturing duration; and obtaining the time length required by the user terminal to actually reach the target printing equipment based on the target passing route and the average speed, and obtaining the predicted time when the user terminal reaches the target printing equipment based on the time length and the starting time.
5. The intelligent printing remote control method based on the internet of things of claim 4, wherein the step S500 comprises:
step S501: extracting the predicted time when the first user terminal reaches the corresponding target printing equipment for a certain request chain which is preliminarily judged to have no privacy leakage risk
Figure 431997DEST_PATH_IMAGE019
Estimated time when the second user terminal arrives at the corresponding target printing apparatus
Figure 981928DEST_PATH_IMAGE020
(ii) a Setting the hidden risk time interval between the first user printing request and the second user printing request in the certain request chain as
Figure 66558DEST_PATH_IMAGE021
Step S502: if it is
Figure 625715DEST_PATH_IMAGE022
Figure 213823DEST_PATH_IMAGE023
And is and
Figure 934654DEST_PATH_IMAGE024
judging that the verification result of the certain request chain is that the privacy leakage risk exists; if it is
Figure 241002DEST_PATH_IMAGE022
Figure 338271DEST_PATH_IMAGE023
And is and
Figure 374360DEST_PATH_IMAGE025
and judging that the verification result of the certain request chain is that no privacy leakage risk exists.
6. The internet of things-based intelligent printing remote management and control method according to claim 4, wherein the step S500 further comprises:
step S503: extracting the predicted time when the first user terminal reaches the corresponding target printing equipment for a certain request chain which is preliminarily judged to have the privacy leakage risk
Figure 639994DEST_PATH_IMAGE019
Estimated time when the second user terminal arrives at the corresponding target printing apparatus
Figure 558271DEST_PATH_IMAGE020
(ii) a Setting the risk time interval existing between the printing request of the first user and the printing request of the second user in the certain request chain as
Figure 334597DEST_PATH_IMAGE021
Step S504: if it is
Figure 756351DEST_PATH_IMAGE026
And is and
Figure 959931DEST_PATH_IMAGE027
judging that the verification result of the certain request chain is that no privacy leakage risk exists; if it is
Figure 365504DEST_PATH_IMAGE023
Or is or
Figure 945521DEST_PATH_IMAGE026
And is and
Figure 487361DEST_PATH_IMAGE028
and judging that the verification result of the certain request chain is that the privacy leakage risk exists.
7. The intelligent printing remote management and control method based on the internet of things according to claim 4, wherein the step S600 comprises:
step S601: extracting a first user terminal from each request chain with privacy leakage risks displayed in the verification result, and sending an intelligent prompt with privacy leakage risks to the first user terminal;
step S602: and prompting the printing sequence capable of being delayed to each first user terminal or delaying the request starting response time, and adjusting the user printing request sequence based on the feedback result of each first user terminal.
8. The remote management and control system for the intelligent printing based on the Internet of things is characterized by comprising an equipment connection management module, an information combing module, a privacy leakage risk judging module, a predicted time management module, a privacy leakage risk checking module and a sequence intelligent adjusting module, wherein the equipment connection management module is used for managing the information leakage risk of the equipment;
the device connection management module is used for acquiring geographical position information of a user who completes registration and initiates a printing request through the mobile terminal, recommending all alternative printing devices located in a preset range to the user by taking the geographical position of the user as a center, and selecting one printing device from all the alternative printing devices as a target printing device by the user and completing connection;
the information combing module is used for sequencing all the user printing requests received by each printing device according to the request initiation time to obtain a user printing request sequence; performing information combing on each user printing request in the user printing request sequence;
the privacy leakage risk judging module is used for receiving the data in the information combing module, preliminarily judging whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests, and extracting a risk time period;
the estimated time management module is used for predicting the time when the first user terminal corresponding to the first user printing request with the request initiation time before in each request chain reaches the corresponding target printing equipment; the second user terminal is used for predicting the time when the second user terminal corresponding to the second user printing request with the later initiating time in each request chain reaches the corresponding target printing equipment;
the privacy leakage risk checking module is used for receiving the data in the estimated time management module and checking whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests;
and the sequence intelligent adjusting module is used for receiving the data in the privacy leakage risk checking module, intelligently reminding the user terminals involved in the privacy leakage risks in the user printing request sequence, and adjusting the user printing request sequence based on the feedback results of the intelligent reminding of the user terminals.
9. The intelligent printing remote control system based on the internet of things according to claim 8, wherein the privacy leakage risk judgment module comprises a preliminary judgment unit and a time period extraction unit;
the preliminary judgment unit is used for receiving the data in the information combing module and preliminarily judging whether privacy leakage risks exist in a request chain formed by every two adjacent printing requests;
and the time interval extracting unit is used for receiving the data in the preliminary judging unit, extracting the existing risk time interval for the request chain with the privacy leakage risk, and extracting the hidden risk time interval for the request chain without the privacy leakage risk.
CN202211476649.1A 2022-11-23 2022-11-23 Intelligent printing remote control system and method based on Internet of things Active CN115543237B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211476649.1A CN115543237B (en) 2022-11-23 2022-11-23 Intelligent printing remote control system and method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211476649.1A CN115543237B (en) 2022-11-23 2022-11-23 Intelligent printing remote control system and method based on Internet of things

Publications (2)

Publication Number Publication Date
CN115543237A true CN115543237A (en) 2022-12-30
CN115543237B CN115543237B (en) 2023-03-10

Family

ID=84721345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211476649.1A Active CN115543237B (en) 2022-11-23 2022-11-23 Intelligent printing remote control system and method based on Internet of things

Country Status (1)

Country Link
CN (1) CN115543237B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004362078A (en) * 2003-06-02 2004-12-24 Ricoh Co Ltd Print supporting method and print supporting program
CN106951198A (en) * 2017-03-03 2017-07-14 华中科技大学 A kind of mobile cloud Method of printing and system
CN108073369A (en) * 2017-11-13 2018-05-25 成都创慧科达科技有限公司 The Reserve Print method and print control system of a kind of printer

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004362078A (en) * 2003-06-02 2004-12-24 Ricoh Co Ltd Print supporting method and print supporting program
CN106951198A (en) * 2017-03-03 2017-07-14 华中科技大学 A kind of mobile cloud Method of printing and system
CN108073369A (en) * 2017-11-13 2018-05-25 成都创慧科达科技有限公司 The Reserve Print method and print control system of a kind of printer

Also Published As

Publication number Publication date
CN115543237B (en) 2023-03-10

Similar Documents

Publication Publication Date Title
US11042940B1 (en) Insurance claim processing via streaming video
US8583508B1 (en) Call routing apparatus
US9317842B2 (en) Dynamic allocation of video resources
CA3069731A1 (en) A fraud detection system and method
CN110855666B (en) Gateway equipment activation method, device, equipment and medium based on end cloud cooperation
WO2021147480A1 (en) Live broadcast assistance method and electronic device
CN109508527A (en) A kind of method that realizing that different terminals account is unified, terminal and server
US7401118B1 (en) Web information preferential transfer system
CN108234171A (en) A kind of data processing method, system and device
CN110096244A (en) A kind of information sharing method and relevant device based on data processing
CN115543237B (en) Intelligent printing remote control system and method based on Internet of things
CN104601644A (en) Service provider determining method, service provider determining device and service provider determining system
CN114219439A (en) Batch social software registration method for preventing feature recognition
WO2011103835A2 (en) User access control method, apparatus and system
CN104394151A (en) Method, device and system for accessing campus network into operator network
EP3313039A1 (en) Home gateway, communication management method and communication system thereof
CN110298651A (en) Payment control method, device, system and storage medium out of the station
CN113596383B (en) Method, device and equipment for managing participants of network conference
CN106612241B (en) Service control method and device
CN104683360B (en) Ip voice communication system
US20050195793A1 (en) System for locally synchronizing a group of mobile devices
CN112399209B (en) Video service identification processing method and device
CN113852694A (en) Message pushing system and pushing method for multi-terminal access client system
CN112035043A (en) Video call processing method and related equipment
US20140320899A1 (en) Time-Based, Intelligent Print Release

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant