CN115934005B - Data storage method and system - Google Patents

Data storage method and system Download PDF

Info

Publication number
CN115934005B
CN115934005B CN202310233116.9A CN202310233116A CN115934005B CN 115934005 B CN115934005 B CN 115934005B CN 202310233116 A CN202310233116 A CN 202310233116A CN 115934005 B CN115934005 B CN 115934005B
Authority
CN
China
Prior art keywords
distribution
information
area
suspicious
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310233116.9A
Other languages
Chinese (zh)
Other versions
CN115934005A (en
Inventor
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongke Supercomputing Technology Co ltd
Original Assignee
Shenzhen Zhongke Supercomputing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongke Supercomputing Technology Co ltd filed Critical Shenzhen Zhongke Supercomputing Technology Co ltd
Priority to CN202310233116.9A priority Critical patent/CN115934005B/en
Publication of CN115934005A publication Critical patent/CN115934005A/en
Application granted granted Critical
Publication of CN115934005B publication Critical patent/CN115934005B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention is applicable to the field of computers, and provides a data storage method and a data storage system, wherein the method comprises the following steps: obtaining overhaul data in a target area, wherein the target area comprises a plurality of secondary sub-areas; identifying corresponding pre-operation of the overhaul data, and generating first operation prompt information, wherein the first operation prompt information is used for prompting subsequent permission operation in a target area; when fault information under the first operation prompt information is detected, identifying the distribution position of at least one part associated with the fault information, and detecting suspicious operation corresponding to the distribution position; the distributed positions are associated with the corresponding suspicious operations to generate suspicious illegal operation data, and the beneficial effects of the invention are that: through distributed data storage, the requirements of professional overhaul and non-professional overhaul are met, and the risk of misoperation can be reduced.

Description

Data storage method and system
Technical Field
The present invention relates to the field of computers, and in particular, to a data storage method and system.
Background
Along with the intelligent development of the manufacturing industry, the scale of the manufacturing industry is also expanding, the application proportion of intelligent equipment is higher and higher, the fault subdivision degree of the equipment is higher and higher, and the timely repair of the equipment by maintenance personnel is very important.
In the prior art, when the maintenance of the fault equipment is involved, maintenance personnel are required to be contacted, and generally the maintenance personnel directly reach the site so as to carry out inspection, maintenance and repair on the fault equipment, but considering that the spare time of the same maintenance personnel and the time to be maintained may not completely coincide, the situation of remotely guiding maintenance or replacing the maintenance personnel may exist, and under the condition of overhauling by non-maintenance personnel and replacing the maintenance personnel, faults are easy to be caused due to error operation. Accordingly, a data storage method and system are provided to solve the above-mentioned technical problems.
Disclosure of Invention
An embodiment of the present invention is directed to a data storage method and system, which aim to solve the problems set forth in the background art.
The embodiment of the invention is realized in such a way that, in one aspect, a data storage method comprises the following steps:
obtaining overhaul data in a target area, wherein the target area comprises a plurality of secondary sub-areas;
identifying corresponding pre-operation of the overhaul data, and generating first operation prompt information, wherein the first operation prompt information is used for prompting subsequent permission operation in a target area;
when fault information under the first operation prompt information is detected, identifying the distribution position of at least one part associated with the fault information, and detecting suspicious operation corresponding to the distribution position;
correlating the distribution positions with corresponding suspicious operations to generate suspicious illegal operation data;
storing the suspicious illegal operation data in a storage distribution area to which a corresponding distribution position belongs, and prompting the suspicious illegal operation data when a target area is detected to meet a prompting condition, wherein the prompting condition comprises that an association preparation operation exists in a primary sub-area where the storage distribution area is located, and the association preparation operation and the suspicious operation meet a preset association condition or a preset similar condition, wherein each primary sub-area comprises at least two secondary sub-areas, and each secondary sub-area comprises at least one storage distribution area.
As a further aspect of the present invention, the method further includes:
detecting a distance between an active target and a device position in a target area;
when the distance between the movable target and the equipment position reaches a threshold distance, acquiring image information of the set position in the equipment position;
identifying local form information of a set bit according to the image information, wherein the local form information comprises the quantity distribution of parts and/or action tracks, and the action tracks comprise at least one of a moving track and a rotating track;
and when at least one of the local form information is detected to change according to the image information, judging that the overhaul behavior possibly exists in the target area.
As still further aspects of the present invention, the method further includes:
when the fact that overhaul behaviors possibly exist in the target area is judged, overhaul authentication prompt information is sent out;
identifying and authenticating the movable targets in the target area;
and generating overhaul data in the target area according to the identification authentication result and the local form information, wherein the authentication result comprises internal staff and professionals.
As still further aspect of the present invention, the identifying the corresponding pre-operation of the service data generates a first operation prompt message, specifically including:
extracting a setting bit of the local morphological information change in the overhaul data;
detecting a change in the set bit based on the extracted set bit;
generating corresponding pre-operation of the overhaul data according to the change of the set bit, wherein the corresponding pre-operation is used for enabling the set bit to change;
and searching for the maintenance corresponding operation matched with the corresponding pre-operation according to the corresponding relation between the change of the set bit and the maintenance corresponding operation, and generating a first operation prompt according to the searching result.
As a further aspect of the present invention, the detecting suspicious operations corresponding to the distribution locations specifically includes:
acquiring first operation information of an operator in a set distance range of distribution positions;
screening second operation information within a set period according to the first operation information, wherein the set period comprises a time from the time of prompting the first operation prompting information to the time of detecting corresponding fault information;
identifying an operation action of an operator in the second operation information, wherein the operation action comprises a torsion action and/or a drawing action;
acquiring action positions of the torsion action and/or the drawing action, wherein the action positions comprise a pointing position and a direct contact position;
detecting whether the action position and the distribution position have coincident positions or not;
if yes, extracting an operation action corresponding to the superposition position, wherein the suspicious operation comprises the operation action corresponding to the superposition position.
As a further aspect of the present invention, the associating preparation operation and the suspicious operation satisfy a preset associating condition or a preset similarity condition, and specifically includes: and the operation gesture characteristics between the association preparation operation and the suspicious operation meet the preset similarity or the preset association degree.
As a further aspect of the present invention, the method further includes:
and when the fact that the professional enters the primary subarea where the storage distribution area is located is detected, a first terminal is instructed to respond and report suspicious illegal operation data, wherein the first terminal comprises a terminal bound with the professional.
As a further aspect of the present invention, the method further includes:
when detecting that an operator approaches a certain storage distribution area, sending out a no-touch prompt message;
when detecting that an unauthenticated operator touches a certain storage distribution area, indicating a terminal of at least one adjacent storage distribution area to collect character distribution information of a secondary sub-area where the certain storage distribution area is located, and storing the character distribution information and then sending the character distribution information to all other storage distribution areas;
screening a storage distribution area corresponding to the character distribution information, and marking the storage distribution area which does not store any character distribution information as a first suspicious storage distribution area;
comparing the number of the storage distribution areas corresponding to the character distribution information, and marking the storage distribution area with the largest number as an effective storage distribution area;
identifying whether character distribution information of the effective storage distribution area comprises character distribution information of a secondary sub-area where the first suspicious storage distribution area is located, if so, marking the corresponding first suspicious storage distribution area as a second suspicious storage distribution area;
upon detecting that an authenticated operator enters the target area, a corruption viewing prompt is issued regarding a storage corruption for prompting the first and second suspicious storage distribution areas.
As a further aspect of the present invention, in another aspect, a data storage system, the system comprises:
an acquisition module for: obtaining overhaul data in a target area, wherein the target area comprises a plurality of secondary sub-areas;
an identification module for: identifying corresponding pre-operation of the overhaul data, and generating first operation prompt information, wherein the first operation prompt information is used for prompting subsequent permission operation in a target area;
a distribution and operation detection module for: when fault information under the first operation prompt information is detected, identifying the distribution position of at least one part associated with the fault information, and detecting suspicious operation corresponding to the distribution position;
the associated data generation module is used for: correlating the distribution positions with corresponding suspicious operations to generate suspicious illegal operation data;
the data storage and condition prompting module is used for: storing the suspicious illegal operation data in a storage distribution area to which a corresponding distribution position belongs, and prompting the suspicious illegal operation data when a target area is detected to meet a prompting condition, wherein the prompting condition comprises that an association preparation operation exists in a primary sub-area where the storage distribution area is located, and the association preparation operation and the suspicious operation meet a preset association condition or a preset similar condition, wherein each primary sub-area comprises at least two secondary sub-areas, and each secondary sub-area comprises at least one storage distribution area.
According to the data storage method and system provided by the embodiment of the invention, the first operation prompt information is generated by acquiring the overhaul data and identifying the corresponding pre-operation of the overhaul data, so that the requirements of professional overhaul and non-professional overhaul can be met; further, when fault information under the first operation prompt information is detected, the distribution position of at least one part associated with the fault information and corresponding suspicious operation are identified, suspicious illegal operation data generated according to the distribution position are stored in a storage distribution area to which the corresponding distribution position belongs, when a target area is detected to meet the prompt condition, the suspicious illegal operation data are prompted, the prompt condition comprises that association preparation operation exists in a first-level sub-area where the storage distribution area is located, the association preparation operation and the suspicious operation meet preset association conditions or preset similar conditions, namely, through distributed storage of the suspicious illegal operation data, generalized operation prompt requirements in the first-level sub-area of the target area are met, and the risk of operation errors can be reduced.
Drawings
FIG. 1 is a main flow chart of a data storage method.
FIG. 2 is a flow chart of a method of data storage for determining that service activity may exist in a target area.
FIG. 3 is a flow chart of a method of generating a first operation hint based on a lookup result in a data storage method.
FIG. 4 is a flow chart of an operation action of extracting a position corresponding to the coincidence in a data storage method.
FIG. 5 is a flow chart of a method of issuing a corruption review prompt regarding a corruption of storage in a data storage method.
Fig. 6 is a main structural diagram of a data storage system.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Specific implementations of the invention are described in detail below in connection with specific embodiments.
The data storage method and system provided by the invention solve the technical problems in the background technology.
As shown in fig. 1, a main flow chart of a data storage method according to an embodiment of the present invention is provided, where the data storage method includes:
step S10: obtaining overhaul data in a target area, wherein the target area comprises a plurality of secondary sub-areas; in combination with the following steps, the hierarchical distribution relationship of the target area may be: a target area, a primary sub-area, a secondary sub-area and a storage distribution area; the target area is generally an area with man-machine interaction or man-machine cooperation work; the overhaul data is used for indicating that general maintenance or overhaul maintenance under faults exist in the target area;
step S11: identifying corresponding pre-operation of the overhaul data, and generating first operation prompt information, wherein the first operation prompt information is used for prompting subsequent permission operation in a target area; considering that the corresponding pre-operation of the service data may include general maintenance or professional service, particularly general maintenance, is most likely to be completed by an internal staff member in the target area, it is necessary to prompt a subsequent grant operation corresponding to the corresponding pre-operation on the basis of the corresponding pre-operation; subsequent grant operations facilitate reducing the likelihood of failure from a miss operation; for example, when it is detected that the cover of a certain module in the man-machine interaction area may be opened, a prompt for cutting off the relevant signal may be issued, a prompt for paying attention to the installation order may also be issued, or the like;
step S12: when fault information under the first operation prompt information is detected, identifying the distribution position of at least one part associated with the fault information, and detecting suspicious operation corresponding to the distribution position; the foregoing first operation prompt information is beneficial to improving the error rate and error rate of the overhaul operation, but may not be completely avoided, and may also have a fault operation, where the fault operation may cause a fault, and the source of the fault information is generally based on a direct fault of a component, a connection fault of a connection part (mating part) between components, or a communication fault, and in a case that a fault occurrence period is in an operation period, a fault cause of the distribution position is most likely to be a suspicious operation;
step S13: correlating the distribution positions with corresponding suspicious operations to generate suspicious illegal operation data; the distribution positions are associated with suspicious operations, namely, the distribution positions and the suspicious operations are corresponding, the number of corresponding objects is not limited, and the corresponding objects can be one distribution position corresponding to a plurality of operations or the same operation can be applied to the plurality of distribution positions;
step S14: storing the suspicious illegal operation data in a storage distribution area to which a corresponding distribution position belongs, and prompting the suspicious illegal operation data when a target area is detected to meet a prompting condition, wherein the prompting condition comprises that an association preparation operation exists in a primary sub-area where the storage distribution area is located, and the association preparation operation and the suspicious operation meet a preset association condition or a preset similar condition, wherein each primary sub-area comprises at least two secondary sub-areas, and each secondary sub-area comprises at least one storage distribution area. It can be understood that, considering the region diversity of the association preparation operation, that is, the suspicious illegal operation data is stored in the corresponding storage distribution area in at least one of the plurality of primary sub-areas, and when the target area is detected to meet the prompting condition, the suspicious illegal operation data is prompted, so that the generalized operation prompting requirement in the primary sub-area with function association is met; in addition, illegal operation data are not required to be transmitted to a remote cloud data center for processing, and data analysis and processing are completed nearby, so that the requirements of nearby storage and subsequent prompt calculation can be met; by detecting the association preparation operation, it is possible to prevent the degree of failure from being increased or new failure from being added in the case of the erroneous operation as much as possible.
When the method is applied, the first operation prompt information is generated by acquiring the overhaul data and identifying the corresponding pre-operation of the overhaul data, so that the requirements of professional overhaul and non-professional overhaul can be met; further, when fault information under the first operation prompt information is detected, the distribution position of at least one part associated with the fault information and corresponding suspicious operation are identified, suspicious illegal operation data generated according to the distribution position are stored in a storage distribution area to which the corresponding distribution position belongs, when a target area is detected to meet the prompt condition, the suspicious illegal operation data are prompted, the prompt condition comprises that association preparation operation exists in a first-level sub-area where the storage distribution area is located, the association preparation operation and the suspicious operation meet preset association conditions or preset similar conditions, namely, through distributed storage of the suspicious illegal operation data, generalized operation prompt requirements in the first-level sub-area of the target area are met, the risk of operation errors can be reduced, and faults can be prevented.
As shown in fig. 2, as a preferred embodiment of the present invention, the method further includes:
step S20: detecting a distance between an active target and a device position in a target area;
step S21: when the distance between the movable target and the equipment position reaches a threshold distance, acquiring image information of the set position in the equipment position; the setting bit is a preset position in the equipment bit, and can be an actual position in the comparison equipment bit or a virtual position in the space where the equipment bit is located;
step S22: identifying local form information of a set bit according to the image information, wherein the local form information comprises the quantity distribution of parts and/or action tracks, and the action tracks comprise at least one of a moving track and a rotating track;
step S23: and when at least one of the local form information is detected to change according to the image information, judging that the overhaul behavior possibly exists in the target area.
It will be appreciated that the moving object may be a corresponding person, a robot under control of a corresponding person, or the like, and when the distance between the moving object and the device position reaches the threshold distance, a condition is provided that causes the state of the parts in the setting position to be changed, where the condition may be represented by the distribution of the number of the setting position parts and/or the change of the motion track, for example, a certain mechanical cover position in the target area, where the number of parts is increased in the image information of the cover position, to indicate that the cover is opened, and the internal parts are exposed, for example, where the protection position (setting position) of a certain core position in the target area is opened, and the protection position is opened by deflection or translation, where the situation when at least one of the local form information changes may be satisfied.
As a preferred embodiment of the present invention, the method further comprises:
step S30: when the fact that overhaul behaviors possibly exist in the target area is judged, overhaul authentication prompt information is sent out;
step S31: identifying and authenticating the movable targets in the target area;
step S32: and generating overhaul data in the target area according to the identification authentication result and the local form information, wherein the authentication result comprises internal staff and professionals.
It can be understood that when the identification authentication is performed on the moving object, the authentication can be authentication identity authentication, such as biological information authentication of face information, fingerprint information and the like, and the professional is the condition of meeting the corresponding authentication condition; or an internal staff and a professional, respectively, that meet different certification conditions.
As shown in fig. 3, as a preferred embodiment of the present invention, the identifying the corresponding pre-operation of the service data generates a first operation prompt message, which specifically includes:
step S111: extracting a setting bit of the local morphological information change in the overhaul data;
step S112: detecting a change in the set bit based on the extracted set bit;
step S113: generating corresponding pre-operation of the overhaul data according to the change of the set bit, wherein the corresponding pre-operation is used for enabling the set bit to change;
step S114: and searching for the maintenance corresponding operation matched with the corresponding pre-operation according to the corresponding relation between the change of the set bit and the maintenance corresponding operation, and generating a first operation prompt according to the searching result.
It should be understood that, the corresponding pre-operation is generally a theoretical operation that causes a certain change in the (part) of the setting bit, such as a rotating operation, a moving operation, etc. that causes the part to deviate from the corresponding portion, or an action that causes the setting bit to deform, such as a knocking action, etc., where the corresponding relationship between the change of the setting bit and the maintenance corresponding operation indicates that the correct operation is performed under the change of the corresponding setting bit, and these correct operations are mainly used for reducing the loss caused by the error or continuing the correct operation under a certain operation; specifically, the operations for detaching the parts from the corresponding parts may be reverse rotation operations, reverse movement operations, etc. to realize resetting of the valve, the screw, the movement locking member, etc.
As shown in fig. 4, as a preferred embodiment of the present invention, the detecting the suspicious operation corresponding to the distribution location specifically includes:
step S121: acquiring first operation information of an operator in a set distance range of distribution positions;
step S122: screening second operation information within a set period according to the first operation information, wherein the set period comprises a time from the time of prompting the first operation prompting information to the time of detecting corresponding fault information;
step S123: identifying an operation action of an operator in the second operation information, wherein the operation action comprises a torsion action and/or a drawing action;
step S124: acquiring action positions of the torsion action and/or the drawing action, wherein the action positions comprise a pointing position and a direct contact position;
step S125: detecting whether the action position and the distribution position have coincident positions or not;
step S126: if yes, extracting an operation action corresponding to the superposition position, wherein the suspicious operation comprises the operation action corresponding to the superposition position. The overlapping may be complete or partial.
When the method is applied, the time period and the distance range are set, namely, the premise of causing corresponding faults is limited, the time condition of human faults and the condition of on-site operation are met, and the identification reliability of suspicious operation is fully ensured; further, the torsion action in the operation action can change the working or mounting state of the parts; the drawing action can change the motion state or the working state of the parts, and the combined motion of the parts and the working state can be suitable for more complex scenes; in view of the sensitivity of the motion and the accuracy of recognition, the pointing position (including distance or approach) of the operation motion can be a certain part or an operation area where the part is located, and the direct contact further indicates that the motion and the part have an effect, and the distribution position is an area directly related to the faulty part, so that a serious operation suspicion causing the fault exists in the superposition position conforming to the superposition condition.
As a preferred embodiment of the present invention, the associating preparation operation and the suspicious operation satisfy a preset associating condition or a preset similarity condition, which specifically includes: and the operation gesture characteristics between the association preparation operation and the suspicious operation meet the preset similarity or the preset association degree.
It may be understood that the association preparation operation and the suspicious operation satisfy a preset association condition or a preset similarity condition, which indicates that the next operation of the association preparation operation is the suspicious operation or an operation with extremely high similarity to the suspicious operation, specifically, for example, a gesture of holding a specific tool to perform a certain action and a gesture of performing a certain action by a certain specific tool; for another example, the first tool and the second tool may be replaced by each other in a posture where the first tool is ready to perform a certain operation and a posture where the second tool is performed a certain operation, wherein the association preparation operation defines a first level sub-area where the storage distribution area is located, and since there is a functional association between devices in the first level sub-area, the association preparation operation is most likely to be associated with the same device or the same part as the suspicious operation, so that the present embodiment can reduce the failure probability index, and avoid further expansion of the accident under the chain reaction.
As a preferred embodiment of the present invention, the method further comprises:
step S40: and when the fact that the professional enters the primary subarea where the storage distribution area is located is detected, a first terminal is instructed to respond and report suspicious illegal operation data, wherein the first terminal comprises a terminal bound with the professional.
When the method is applied, suspicious illegal operation data are broadcasted on site through the terminal bound with the professional, and a cognitive basis for subsequent operation can be provided for the professional through the illegal operation data.
As shown in fig. 5, as a preferred embodiment of the present invention, the method further includes:
step S50: when detecting that an operator approaches a certain storage distribution area, sending out a no-touch prompt message; no touch is needed;
step S51: when detecting that an unauthenticated operator touches a certain storage distribution area, indicating a terminal of at least one adjacent storage distribution area to collect character distribution information of a secondary sub-area where the certain storage distribution area is located, and storing the character distribution information and then sending the character distribution information to all other storage distribution areas; unauthorized operators are most likely to be internal operators of the target area; the character distribution information can be character activity information or character contact operation information;
step S52: screening a storage distribution area corresponding to the character distribution information, and marking the storage distribution area which does not store any character distribution information as a first suspicious storage distribution area;
step S53: comparing the number of the storage distribution areas corresponding to the character distribution information, and marking the storage distribution area with the largest number as an effective storage distribution area; considering that partial data transmission failure possibly exists in the transmission after the character distribution information is stored, only the storage distribution area with the largest number is considered; the quantitative comparison here should be a synchronous comparison at the same acquisition time;
step S54: identifying whether character distribution information of the effective storage distribution area comprises character distribution information of a secondary sub-area where the first suspicious storage distribution area is located, if so, marking the corresponding first suspicious storage distribution area as a second suspicious storage distribution area;
step S55: upon detecting that an authenticated operator enters the target area, a corruption viewing prompt is issued regarding a storage corruption for prompting the first and second suspicious storage distribution areas. Authenticated operators are typically professionals;
it should be understood that the storage distribution area is an important area to be protected, which may be damaged by intention or not for some reasons, and the damaged object especially includes an unauthenticated operator, for this case, if a certain storage distribution area is damaged by storage, it is highly likely that the stored information in the storage distribution area is lost, so that the person distribution information in a certain storage distribution area is identified by the terminal of an adjacent storage distribution area, and the person distribution information is stored and then sent to all other storage distribution areas, so that at least one storage distribution area can store the person distribution information completely with high probability;
if the authenticated operator enters the target area, if only the first suspicious storage distribution area is finally prompted, then there may be no unauthorized operator contacting a storage distribution area (the possibility of data transmission loss is relatively low), and if other channels indicate that the storage distribution area is damaged, the responsibility of the unauthorized operator should not be attributed to the unauthorized operator; if the second suspicious storage distribution area is finally prompted, the first suspicious storage distribution area is indicated to be most likely to be damaged due to human contact, and a decision basis can be provided for damage and responsibility of the storage distribution area.
As another preferred embodiment of the present invention, as shown in fig. 6, in another aspect, a data storage system includes:
an acquisition module 100 for: obtaining overhaul data in a target area, wherein the target area comprises a plurality of secondary sub-areas;
an identification module 200 for: identifying corresponding pre-operation of the overhaul data, and generating first operation prompt information, wherein the first operation prompt information is used for prompting subsequent permission operation in a target area;
a distribution and operation detection module 300 for: when fault information under the first operation prompt information is detected, identifying the distribution position of at least one part associated with the fault information, and detecting suspicious operation corresponding to the distribution position;
the association data generation module 400 is configured to: correlating the distribution positions with corresponding suspicious operations to generate suspicious illegal operation data;
the data storage and condition prompting module 500 is configured to: storing the suspicious illegal operation data in a storage distribution area to which a corresponding distribution position belongs, and prompting the suspicious illegal operation data when a target area is detected to meet a prompting condition, wherein the prompting condition comprises that an association preparation operation exists in a primary sub-area where the storage distribution area is located, and the association preparation operation and the suspicious operation meet a preset association condition or a preset similar condition, wherein each primary sub-area comprises at least two secondary sub-areas, and each secondary sub-area comprises at least one storage distribution area.
The embodiment of the invention provides a data storage method and a data storage system based on the data storage method, wherein the first operation prompt information is generated by acquiring overhaul data and identifying corresponding pre-operation of the overhaul data, so that the requirements of professional overhaul and non-professional overhaul can be met; further, when fault information under the first operation prompt information is detected, the distribution position of at least one part associated with the fault information and corresponding suspicious operation are identified, suspicious illegal operation data generated according to the distribution position are stored in a storage distribution area to which the corresponding distribution position belongs, when a target area is detected to meet the prompt condition, the suspicious illegal operation data are prompted, the prompt condition comprises that association preparation operation exists in a first-level sub-area where the storage distribution area is located, the association preparation operation and the suspicious operation meet preset association conditions or preset similar conditions, namely, through distributed storage of the suspicious illegal operation data, generalized operation prompt requirements in the first-level sub-area of the target area are met, and the risk of operation errors can be reduced.
In order to be able to load the method and system described above to function properly, the system may include more or less components than those described above, or may combine some components, or different components, in addition to the various modules described above, for example, may include input and output devices, network access devices, buses, processors, memories, and the like.
The processor may be a central processing unit (CentralProcessingUnit, CPU), other general purpose processors, digital signal processors (DigitalSignalProcessor, DSP), application specific integrated circuits (ApplicationSpecificIntegratedCircuit, ASIC), off-the-shelf programmable gate arrays (Field-ProgrammableGateArray, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, which is a control center of the above system, and various interfaces and lines are used to connect the various parts.
The memory may be used to store a computer and a system program and/or module, and the processor may perform the various functions described above by running or executing the computer program and/or module stored in the memory and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as an information acquisition template presentation function, a product information distribution function, etc.), and the like. The storage data area may store data created according to the use of the berth status display system (e.g., product information acquisition templates corresponding to different product types, product information required to be released by different product providers, etc.), and so on. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, memory, plug-in hard disk, smart memory card (SmartMediaCard, SMC), secure digital (SecureDigital, SD) card, flash card (FlashCard), at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the invention and are described in detail herein without thereby limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the invention.

Claims (8)

1. A method of data storage, the method comprising:
obtaining overhaul data in a target area, wherein the target area comprises a plurality of secondary sub-areas;
identifying corresponding pre-operation of the overhaul data, and generating first operation prompt information, wherein the first operation prompt information is used for prompting subsequent permission operation in a target area;
when fault information under the first operation prompt information is detected, identifying the distribution position of at least one part associated with the fault information, and detecting suspicious operation corresponding to the distribution position;
correlating the distribution positions with corresponding suspicious operations to generate suspicious illegal operation data;
storing the suspicious illegal operation data in a storage distribution area to which a corresponding distribution position belongs, and prompting the suspicious illegal operation data when a target area is detected to meet a prompting condition, wherein the prompting condition comprises that an association preparation operation exists in a primary sub-area where the storage distribution area is located, and the association preparation operation and the suspicious operation meet a preset association condition or a preset similar condition, wherein each primary sub-area comprises at least two secondary sub-areas, and each secondary sub-area comprises at least one storage distribution area;
the detecting suspicious operations corresponding to the distribution positions specifically includes:
acquiring first operation information of an operator in a set distance range of distribution positions;
screening second operation information within a set period according to the first operation information, wherein the set period comprises a time from the time of prompting the first operation prompting information to the time of detecting corresponding fault information;
identifying an operation action of an operator in the second operation information, wherein the operation action comprises a torsion action and/or a drawing action;
acquiring action positions of the torsion action and/or the drawing action, wherein the action positions comprise a pointing position and a direct contact position;
detecting whether the action position and the distribution position have coincident positions or not;
if yes, extracting an operation action corresponding to the superposition position, wherein the suspicious operation comprises the operation action corresponding to the superposition position.
2. The data storage method of claim 1, wherein the method further comprises:
detecting a distance between an active target and a device position in a target area;
when the distance between the movable target and the equipment position reaches a threshold distance, acquiring image information of the set position in the equipment position;
identifying local form information of a set bit according to the image information, wherein the local form information comprises the quantity distribution of parts and/or action tracks, and the action tracks comprise at least one of a moving track and a rotating track;
and when at least one of the local form information is detected to change according to the image information, judging that the overhaul behavior possibly exists in the target area.
3. The data storage method of claim 2, wherein the method further comprises:
when the fact that overhaul behaviors possibly exist in the target area is judged, overhaul authentication prompt information is sent out;
identifying and authenticating the movable targets in the target area;
and generating overhaul data in the target area according to the identification authentication result and the local form information, wherein the authentication result comprises internal staff and professionals.
4. The data storage method according to claim 3, wherein the identifying the corresponding pre-operation of the service data generates a first operation prompt message, specifically comprising:
extracting a setting bit of the local morphological information change in the overhaul data;
detecting a change in the set bit based on the extracted set bit;
generating corresponding pre-operation of the overhaul data according to the change of the set bit, wherein the corresponding pre-operation is used for enabling the set bit to change;
and searching for the maintenance corresponding operation matched with the corresponding pre-operation according to the corresponding relation between the change of the set bit and the maintenance corresponding operation, and generating a first operation prompt according to the searching result.
5. The data storage method according to claim 1, wherein a preset association condition or a preset similarity condition is satisfied between the association preparation operation and the suspicious operation, specifically comprising: and the operation gesture characteristics between the association preparation operation and the suspicious operation meet the preset similarity or the preset association degree.
6. A data storage method according to claim 3, wherein the method further comprises:
and when the fact that the professional enters the primary subarea where the storage distribution area is located is detected, a first terminal is instructed to respond and report suspicious illegal operation data, wherein the first terminal comprises a terminal bound with the professional.
7. The data storage method of claim 1 or 5, wherein the method further comprises:
when detecting that an operator approaches a certain storage distribution area, sending out a no-touch prompt message;
when detecting that an unauthenticated operator touches a certain storage distribution area, indicating a terminal of at least one adjacent storage distribution area to collect character distribution information of a secondary sub-area where the certain storage distribution area is located, and storing the character distribution information and then sending the character distribution information to all other storage distribution areas;
screening a storage distribution area corresponding to the character distribution information, and marking the storage distribution area which does not store any character distribution information as a first suspicious storage distribution area;
comparing the number of the storage distribution areas corresponding to the character distribution information, and marking the storage distribution area with the largest number as an effective storage distribution area;
identifying whether character distribution information of the effective storage distribution area comprises character distribution information of a secondary sub-area where the first suspicious storage distribution area is located, if so, marking the corresponding first suspicious storage distribution area as a second suspicious storage distribution area;
upon detecting that an authenticated operator enters the target area, a corruption viewing prompt is issued regarding a storage corruption for prompting the first and second suspicious storage distribution areas.
8. A data storage system, the system comprising:
an acquisition module for: obtaining overhaul data in a target area, wherein the target area comprises a plurality of secondary sub-areas;
an identification module for: identifying corresponding pre-operation of the overhaul data, and generating first operation prompt information, wherein the first operation prompt information is used for prompting subsequent permission operation in a target area;
a distribution and operation detection module for: when fault information under the first operation prompt information is detected, identifying the distribution position of at least one part associated with the fault information, and detecting suspicious operation corresponding to the distribution position;
the associated data generation module is used for: correlating the distribution positions with corresponding suspicious operations to generate suspicious illegal operation data;
the data storage and condition prompting module is used for: storing the suspicious illegal operation data in a storage distribution area to which a corresponding distribution position belongs, and prompting the suspicious illegal operation data when a target area is detected to meet a prompting condition, wherein the prompting condition comprises that an association preparation operation exists in a primary sub-area where the storage distribution area is located, and the association preparation operation and the suspicious operation meet a preset association condition or a preset similar condition, wherein each primary sub-area comprises at least two secondary sub-areas, and each secondary sub-area comprises at least one storage distribution area;
wherein, the distribution and operation detection module is specifically further configured to:
acquiring first operation information of an operator in a set distance range of distribution positions;
screening second operation information within a set period according to the first operation information, wherein the set period comprises a time from the time of prompting the first operation prompting information to the time of detecting corresponding fault information;
identifying an operation action of an operator in the second operation information, wherein the operation action comprises a torsion action and/or a drawing action;
acquiring action positions of the torsion action and/or the drawing action, wherein the action positions comprise a pointing position and a direct contact position;
detecting whether the action position and the distribution position have coincident positions or not;
if yes, extracting an operation action corresponding to the superposition position, wherein the suspicious operation comprises the operation action corresponding to the superposition position.
CN202310233116.9A 2023-03-13 2023-03-13 Data storage method and system Active CN115934005B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310233116.9A CN115934005B (en) 2023-03-13 2023-03-13 Data storage method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310233116.9A CN115934005B (en) 2023-03-13 2023-03-13 Data storage method and system

Publications (2)

Publication Number Publication Date
CN115934005A CN115934005A (en) 2023-04-07
CN115934005B true CN115934005B (en) 2023-09-22

Family

ID=86552756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310233116.9A Active CN115934005B (en) 2023-03-13 2023-03-13 Data storage method and system

Country Status (1)

Country Link
CN (1) CN115934005B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104268695A (en) * 2014-09-26 2015-01-07 武汉大学 Multi-center watershed water environment distributed cluster management system and method
CN106841909A (en) * 2016-12-20 2017-06-13 国网辽宁省电力有限公司沈阳供电公司 Multi-source Information Fusion distribution network failure analysis based on direction hierarchical fuzzy Petri network
CN112101665A (en) * 2020-09-16 2020-12-18 珠海格力电器股份有限公司 Fault detection early warning method and device, storage medium and electronic equipment
WO2022166407A1 (en) * 2021-02-05 2022-08-11 深圳市道通科技股份有限公司 Vehicle breakdown prompt information acquiring method and apparatus, and storage medium
CN114997428A (en) * 2022-04-14 2022-09-02 国网北京市电力公司 Station room power supply fault processing method and device, electronic equipment and storage medium
CN115639327A (en) * 2022-12-21 2023-01-24 南方电网数字电网研究院有限公司 Sleeve fault detection method and device based on oil-immersed sleeve gas detection
CN115658470A (en) * 2022-09-21 2023-01-31 中国科学院软件研究所 Distributed system-oriented automatic testing method and device for failure recovery mechanism

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104268695A (en) * 2014-09-26 2015-01-07 武汉大学 Multi-center watershed water environment distributed cluster management system and method
CN106841909A (en) * 2016-12-20 2017-06-13 国网辽宁省电力有限公司沈阳供电公司 Multi-source Information Fusion distribution network failure analysis based on direction hierarchical fuzzy Petri network
CN112101665A (en) * 2020-09-16 2020-12-18 珠海格力电器股份有限公司 Fault detection early warning method and device, storage medium and electronic equipment
WO2022166407A1 (en) * 2021-02-05 2022-08-11 深圳市道通科技股份有限公司 Vehicle breakdown prompt information acquiring method and apparatus, and storage medium
CN114997428A (en) * 2022-04-14 2022-09-02 国网北京市电力公司 Station room power supply fault processing method and device, electronic equipment and storage medium
CN115658470A (en) * 2022-09-21 2023-01-31 中国科学院软件研究所 Distributed system-oriented automatic testing method and device for failure recovery mechanism
CN115639327A (en) * 2022-12-21 2023-01-24 南方电网数字电网研究院有限公司 Sleeve fault detection method and device based on oil-immersed sleeve gas detection

Also Published As

Publication number Publication date
CN115934005A (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN116052275B (en) Abnormal behavior detection method and system based on big data
US20220392280A1 (en) Fault management system for functional safety of automotive grade chip
CN105488393A (en) Database honey pot based attack behavior intention classification method and system
CN103034575A (en) Crash analysis method and device
KR102232876B1 (en) Breakdown type analysis system and method of digital equipment
CN115934005B (en) Data storage method and system
CN111507730A (en) Block chain cross-chain method and device
KR101444250B1 (en) System for monitoring access to personal information and method therefor
CN114625074A (en) Safety protection system and method for DCS (distributed control System) of thermal power generating unit
CN105117332A (en) Stack overflow position detection method
CN117081818A (en) Attack transaction identification and interception method and system based on intelligent contract firewall
CN116882695A (en) Automatic inspection method, device, computer equipment and storage medium
CN111752819A (en) Abnormity monitoring method, device, system, equipment and storage medium
CN108875347A (en) The automatic protection method of hacker attacks and control is prevented based on robot identity card
Khoroshilov et al. Verification of Operating System Components
CN105487951A (en) Method for detecting integrity of naval craft command and control system
CN110647450B (en) Method and device for repairing break point of business process, computer equipment and storage medium
CN117009188B (en) Computer system misoperation prevention system and method
Hassan et al. Digital I&C systems in nuclear power plants. Risk-screening of environmental stressors and a comparison of hardware unavailability with an existing analog system
CN111124726B (en) Method and device for detecting abnormality of open modem port
CN112612882B (en) Review report generation method, device, equipment and storage medium
CN115291816B (en) Memory system for power distribution management system based on three-dimensional visualization
US20230251957A1 (en) Method for analyzing an automation software of an automation device
CN115689561A (en) U shield testing method, device, equipment and medium
CN116910149A (en) File management system based on distributed database

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230901

Address after: Room 502, Building 10, Shenzhen Hong Kong Youth Dream Factory, No. 35 Qianwan 1st Road, Nanshan Street, Qianhai Shenzhen Hong Kong Cooperation Zone, Shenzhen City, Guangdong Province, 518000

Applicant after: Shenzhen Zhongke Supercomputing Technology Co.,Ltd.

Address before: 701-6, Building 10, Yard 88, Liuxiang Road, Fengtai District, Beijing, 100079

Applicant before: BEIJING AMAX HEAT EXCHANGE EQUIPMENT MANUFACTURING CO.,LTD.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant