CN116246380A - Information checking method, information checking device, computer equipment and storage medium - Google Patents

Information checking method, information checking device, computer equipment and storage medium Download PDF

Info

Publication number
CN116246380A
CN116246380A CN202211597229.9A CN202211597229A CN116246380A CN 116246380 A CN116246380 A CN 116246380A CN 202211597229 A CN202211597229 A CN 202211597229A CN 116246380 A CN116246380 A CN 116246380A
Authority
CN
China
Prior art keywords
information
target object
public health
target
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211597229.9A
Other languages
Chinese (zh)
Inventor
左嘉琪
李良斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing SoundAI Technology Co Ltd
Original Assignee
Beijing SoundAI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing SoundAI Technology Co Ltd filed Critical Beijing SoundAI Technology Co Ltd
Priority to CN202211597229.9A priority Critical patent/CN116246380A/en
Publication of CN116246380A publication Critical patent/CN116246380A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9537Spatial or temporal dependent retrieval, e.g. spatiotemporal queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The application provides an information checking method, an information checking device, computer equipment and a storage medium, and belongs to the technical field of Internet. The method comprises the following steps: under the condition that a target chip is detected in a detection range, decrypting the target chip to obtain object information of a target object, wherein the object information is used for uniquely identifying the target object; acquiring public health information of the target object through a corresponding interface of a public health database based on the object information of the target object; and under the condition that the public health information of the target object is in the validity period, controlling the gate to be opened so as to release the target object. According to the technical scheme, manual information checking is replaced by automatic information checking, so that the accuracy and efficiency of information checking are improved, and accurate management of people entering and exiting is realized.

Description

Information checking method, information checking device, computer equipment and storage medium
Technical Field
The present invention relates to the field of internet technologies, and in particular, to an information checking method, an information checking device, a computer device, and a storage medium.
Background
With the development of internet technology, information acquisition through two-dimensional codes has become an increasingly popular trend. Taking a building in daily life as an example, the public health information of the individual can be obtained by scanning the two-dimension code through the intelligent equipment. And then checking public health information, prompting the personnel with abnormal public health information, and releasing the personnel without abnormal public health information, thereby realizing the monitoring and management of the personnel entering and exiting.
At present, an access person manually presents the two-dimension code, and security personnel manually scans the two-dimension code to realize the checking of public health information. However, when the inspection is performed manually, there may occur a case where an effective period of public health information is calculated in error, so that inspection efficiency is lowered, and management of ingress and egress personnel is affected.
Disclosure of Invention
The embodiment of the application provides an information checking method, an information checking device, computer equipment and a storage medium, wherein manual information checking is replaced by automatic information checking, so that the accuracy and efficiency of information checking are improved, and accurate management of people entering and exiting is realized. The technical scheme is as follows:
in one aspect, there is provided an information inspection method, the method including:
under the condition that a target chip is detected in a detection range, decrypting the target chip to obtain object information of a target object, wherein the object information is used for uniquely identifying the target object;
acquiring public health information of the target object through a corresponding interface of a public health database based on the object information of the target object;
and under the condition that the public health information of the target object is in the validity period, controlling the gate to be opened so as to release the target object.
In some embodiments, the obtaining public health information of the target object through a corresponding interface of a public health database based on object information of the target object includes:
determining region information of the target object based on the object information of the target object;
determining the public health database associated with the regional information based on the regional information of the target object;
and acquiring public health information of the target object through a corresponding interface of the public health database.
In some embodiments, in the case that the target chip is detected in the detection range, decrypting the target chip to obtain object information of the target object includes:
under the condition that the target chip is detected in the detection range, carrying out identity verification on the target chip;
and under the condition that the target chip is bound with a management system, decrypting the target chip to obtain the object information of the target object.
In some embodiments, the method further comprises:
and under the condition that the target chip is not bound with the management system, broadcasting first prompt information in a voice mode, wherein the first prompt information is used for prompting that the target object is an unknown object.
In some embodiments, the method further comprises:
determining the detection days of public health information of the target object, wherein the detection days are the days of the time for carrying out health detection last time from the current time;
and broadcasting the detection days through voice.
In some embodiments, the method further comprises:
and under the condition that the public health information of the target object is not in the valid period, broadcasting second prompt information through voice, wherein the second prompt information is used for prompting that the public health information of the target object is out of date.
In some embodiments, after the control gate is turned on in the case that the public health information of the target object is in the validity period, the method further includes:
and deleting the object information and the public health information of the target object.
In another aspect, there is provided an information inspection apparatus, the apparatus including:
the decryption module is used for decrypting the target chip to obtain object information of a target object under the condition that the target chip is detected in the detection range, and the object information is used for uniquely identifying the target object;
the acquisition module is used for acquiring the public health information of the target object through a corresponding interface of the public health database based on the object information of the target object;
and the control module is used for controlling the gate to be opened so as to release the target object under the condition that the public health information of the target object is in the validity period.
In some embodiments, the acquiring module is configured to determine zone information of the target object based on object information of the target object; determining the public health database associated with the regional information based on the regional information of the target object; and acquiring public health information of the target object through a corresponding interface of the public health database.
In some embodiments, the decryption module is configured to perform identity verification on the target chip when the target chip is detected within a detection range; and under the condition that the target chip is bound with a management system, decrypting the target chip to obtain the object information of the target object.
In some embodiments, the apparatus further comprises:
the first broadcasting module is used for broadcasting first prompt information in a voice mode under the condition that the target chip is not bound with the management system, and the first prompt information is used for prompting that the target object is an unknown object.
In some embodiments, the apparatus further comprises:
the determining module is used for determining the detection days of the public health information of the target object, wherein the detection days are the days of the time for carrying out the health detection last time from the current time;
and the second broadcasting module is used for broadcasting the detection days in a voice mode.
In some embodiments, the apparatus further comprises:
and the third broadcasting module is used for broadcasting second prompt information in a voice way under the condition that the public health information of the target object is not in the valid period, and the second prompt information is used for prompting that the public health information of the target object is out of date.
In some embodiments, the apparatus further comprises:
and the deleting module is used for deleting the object information and the public health information of the target object.
In another aspect, a computer device is provided, the computer device including a processor and a memory for storing at least one segment of a computer program loaded and executed by the processor to implement an information inspection method in an embodiment of the present application.
In another aspect, a computer readable storage medium is provided, in which at least one segment of a computer program is stored, the at least one segment of the computer program being loaded and executed by a processor to implement an information inspection method as in an embodiment of the present application.
In another aspect, a computer program product is provided, including a computer program that is executed by a processor to implement the method for checking information provided in the embodiments of the present application.
The embodiment of the application provides an information checking method, which can decrypt a target chip by detecting the target chip in a detection range, namely that a target object appears in the detection range, so as to obtain object information of the target object. Then, since the object information can uniquely identify the target object, public health information of the target object can be obtained through a corresponding interface of the public health database based on the object information of the target object. The public health information can reflect the health condition of the target object in a period of time, so that if the public health information is in the effective period, the current health condition of the target object is good, the gate is controlled to be opened, and the target object is released. The automatic information checking replaces manual information checking, so that the accuracy and efficiency of information checking are improved, and accurate management of people entering and exiting is realized.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an implementation environment of an information checking method according to an embodiment of the present application;
fig. 2 is a flowchart of an information inspection method according to an embodiment of the present application;
FIG. 3 is a flow chart of another method of information verification provided in accordance with an embodiment of the present application;
fig. 4 is a block diagram of an information inspection apparatus provided according to an embodiment of the present application;
fig. 5 is a block diagram of another information inspection apparatus provided according to an embodiment of the present application;
fig. 6 is a block diagram of a terminal according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The terms "first," "second," and the like in this application are used to distinguish between identical or similar items that have substantially the same function and function, and it should be understood that there is no logical or chronological dependency between the "first," "second," and "nth" terms, nor is it limited to the number or order of execution.
The term "at least one" in this application means one or more, and the meaning of "a plurality of" means two or more.
It should be noted that, information (including but not limited to user equipment information, user personal information, etc.), data (including but not limited to data for analysis, stored data, presented data, etc.), and signals referred to in this application are all authorized by the user or are fully authorized by the parties, and the collection, use, and processing of relevant data is required to comply with relevant laws and regulations and standards of relevant countries and regions. For example, object information and public health information of a target object referred to in the present application are acquired with sufficient authorization.
The information checking method provided by the embodiment of the application can be executed by the computer equipment. In some embodiments, the computer device is a terminal or a server. Fig. 1 is a schematic diagram of an implementation environment of an information checking method according to an embodiment of the present application. Referring to fig. 1, the implementation environment includes a terminal 101 and a chip detector 102.
The target chip may be installed on the terminal 101 in a chip form or built into the terminal 101 through an application program. The target chip may be an NFC (Near Field Communication, near field communication technology) chip. The chip detector 102 is an inductive detector. The terminal 101 and the chip detector 102 realize information transmission by a specific electromagnetic wave.
Fig. 2 is a flowchart of an information inspection method according to an embodiment of the present application, and as shown in fig. 2, an example of the method is described in the embodiment of the present application. The method comprises the following steps:
201. and under the condition that the chip detector detects the target chip in the detection range, decrypting the target chip to obtain the object information of the target object, wherein the object information is used for uniquely identifying the target object.
In the embodiment of the present application, the target chip is an inductive chip, such as an NFC chip. The chip detector is an inductive detector, and the detection range can be adjusted through the angle-controllable telescopic tele-rod. The chip detector detects the target chip within the detection range, i.e., the target object appears within the detection range. Therefore, the chip detector can decrypt the target chip to obtain the object information of the target object, so that the management of the entrance and exit of the target object can be realized based on the object information of the target object, and the safety and the accuracy of the entrance and exit management are ensured.
202. The chip detector obtains public health information of the target object through a corresponding interface of the public health database based on the object information of the target object.
In the embodiment of the application, public health information authorized by a plurality of objects is stored in the public health database. The public health information is used to reflect the health of the subject, such as vaccination information, infection control information, and health monitoring information, etc., related information for public health business. Since the object information of the target object includes various information such as region information, sex information, date information, and the like. Therefore, the chip detector can acquire the public health information of the target object from the public health database through the object information of the target object, so that the access of the target object can be managed according to the health condition of the target object reflected by the public health information.
203. And the chip detector controls the gate to be opened under the condition that public health information of the target object is in the validity period so as to release the target object.
In the embodiment of the application, since the health condition of the target object is variable, the public health information can only reflect the health condition of the target object in a period of time. When public health information of the target object is in the effective period, the health condition of the target object is still in a good state, and normal work is not affected. Therefore, the chip detector can control the gate to be opened so as to release the target object. Wherein the effective period can be three days, one week or two weeks, etc. The target object with good health condition is released through the automatic control gate, so that the validity period of public health information is not required to be checked manually, the accuracy and the efficiency of information checking are improved, and the management of people entering and exiting is realized.
The embodiment of the application provides an information checking method, which can decrypt a target chip by detecting the target chip in a detection range, namely that a target object appears in the detection range, so as to obtain object information of the target object. Then, since the object information can uniquely identify the target object, public health information of the target object can be obtained through a corresponding interface of the public health database based on the object information of the target object. The public health information can reflect the health condition of the target object in a period of time, so that if the public health information is in the effective period, the current health condition of the target object is good, the gate is controlled to be opened, and the target object is released. The automatic information checking replaces manual information checking, so that the accuracy and efficiency of information checking are improved, and accurate management of people entering and exiting is realized.
Fig. 3 is a flowchart of another information inspection method provided according to an embodiment of the present application, and as shown in fig. 3, an example of the method is described in the embodiment of the present application. The method comprises the following steps:
301. and under the condition that the chip detector detects the target chip in the detection range, the identity of the target chip is checked.
In the embodiment of the application, the target chip is mounted on a terminal of the target object, such as an NFC chip. Alternatively, the target chip may be installed in the terminal of the target object through an application program. When the target object appears in the detection range of the chip detector, the chip detector can sense the target chip through specific electromagnetic waves, so that the information of the target object is checked. Wherein, this detection scope can be adjusted through the flexible tele-rod of controllable angle. Correspondingly, the chip detector can perform identity verification on the target chip, so that whether the target object is bound with the management system or not can be known, namely whether the target object is an unknown object or not. The primary screening of the people entering and exiting can be realized by carrying out identity verification on the target chip.
302. And the chip detector decrypts the target chip under the condition that the target chip is bound with the management system, so as to obtain the object information of the target object.
In the embodiment of the application, if the target chip is already bound with the management system, it is indicated that the target object has access rights. Therefore, the chip detector can decrypt the target chip to obtain the object information of the target object, so that public health information of the target object can be determined based on the object information of the target object, and further screening of people entering and exiting is realized.
In some embodiments, since the object information of the target object may be an identification card number, an employee number, or a number given by the management system, the personal information belonging to the target object needs to be encrypted. Therefore, after the chip detector decrypts the target chip, the object information of the target object needs to be decrypted to obtain the object information of the target object. By decrypting the object information of the target object, the safety of the information acquisition process is ensured.
In some embodiments, if the target chip is not bound to the management system, it indicates that the target object has no access rights. At this time, the chip detector broadcasts first prompt information in a voice manner, and is used for prompting that the target object is an unknown object. Under the condition that the target chip is not bound, the target object is determined to be an unknown object, so that management of people entering and exiting is realized.
303. The chip detector obtains public health information of the target object through a corresponding interface of the public health database based on the object information of the target object.
In the embodiment of the present application, since the object information of the target object includes information on aspects of the target object, such as sex information, region information, date information, and the like. And different regions in the public health database correspond to different interfaces. After public health detection is carried out on the target object, public health information is uploaded to a public health database through an interface of a region to which the target object belongs. Therefore, the chip detector can acquire the public health information of the target object from the corresponding interface of the public health database through the region information in the object information. Accordingly, the chip detector determines the region information of the target object based on the object information of the target object. Then, the chip detector determines a public health database associated with the region information based on the region information of the target object. Then, the chip detector acquires public health information of the target object through a corresponding interface of the public health database. The information acquisition process has certain safety by determining the corresponding interface of the public health database based on the region information. By acquiring public health information of the target object from the public health database, management of entry and exit of the target object can be achieved according to the public health information.
For example, based on object information of a target object, the chip detector can determine that the target object belongs to region a. Then, the chip detector obtains public health information of the target object through an interface corresponding to the region A in the public health database. Wherein the public health information may be vaccination information.
304. The chip detector determines the detection days of public health information of the target object, and the detection days are broadcasted through voice, wherein the detection days are the days of the last time of health detection and the current time.
In the embodiment of the application, after the chip detector acquires the public health information of the target object, the detection days of the public health information can be automatically determined. The chip detector may then voice broadcast the number of detection days. The number of detection days is determined by the chip detector, so that automatic information checking is realized, and the accuracy and efficiency of information checking are improved.
For example, taking public health information as health detection information as an example, assume that the date on which the target object performs health detection is 12 months 1 day, and the current date is 12 months 5 days. The chip detector can automatically determine that the detection days of the health detection information of the target object are 4 days. The chip detector may then voice broadcast the number of detection days. The content of the voice broadcast may be "your health detection time is 4 days".
305. And the chip detector controls the gate to be opened under the condition that public health information of the target object is in the validity period so as to release the target object.
In the embodiment of the application, the public health information only can reflect the health condition of the target object in a period of time, namely, when the public health information is in the validity period, the health condition of the target object is good; when public health information is not in the validity period, the target object needs to perform health detection to determine the current health condition. Therefore, under the condition that public health information of the target object is in the effective period, the chip detector can control the gate to be opened so as to release the target object; and broadcasting the second prompt information through voice under the condition that the public health information of the target object is not in the validity period. The second prompting information is used for prompting that public health information of the target object is out of date. Through carrying out the management of business turn over according to public health information's validity period for the object that health condition is good can only get into, has realized the accurate management to business turn over personnel.
For example, public health information is taken as health detection information, and the validity period of the health detection information is taken as 7 days as an example. The health detection time of the target object can be obtained by the above step 304 as 12 months 1 day, and the current date as 12 months 5 days. Therefore, the health detection information of the target object is in the effective period, and the chip detector can control the gate to be opened so as to release the target object.
306. The chip detector deletes object information and public health information of the target object.
In the embodiment of the application, the object information and public health information of the target object belong to the personal information of the target object, so that the confidentiality is certain. Therefore, when the chip detector passes the target object or the voice broadcast target object is an unknown object, the object information and public health information of the target object are deleted, so that the safety of automatic information inspection is ensured.
It should be noted that the information checking method provided by the embodiment of the application can also be applied to checking the card. The management system records the first time of the target object passing through the gate, and records the first time of the current day as the first time of card punching. And recording the time of the target object passing through the gate for the second time, and recording as the second time of card punching on the same day. Then, the management system can feed back the times of punching the card of the target object and the time between the punching of the card twice to the organization to which the target object belongs through the corresponding interfaces, thereby realizing automatic punching and attendance checking and saving the time of punching and attendance checking.
The embodiment of the application provides an information checking method, which can decrypt a target chip by detecting the target chip in a detection range, namely that a target object appears in the detection range, so as to obtain object information of the target object. Then, since the object information can uniquely identify the target object, public health information of the target object can be obtained through a corresponding interface of the public health database based on the object information of the target object. The public health information can reflect the health condition of the target object in a period of time, so that if the public health information is in the effective period, the current health condition of the target object is good, the gate is controlled to be opened, and the target object is released. The automatic information checking replaces manual information checking, so that the accuracy and efficiency of information checking are improved, and accurate management of people entering and exiting is realized.
Fig. 4 is a block diagram of an information inspection apparatus provided according to an embodiment of the present application. The apparatus is configured to perform the steps when the method is performed, as shown in fig. 4, where the apparatus includes:
the decryption module 401 is configured to decrypt the target chip to obtain object information of the target object, where the object information is used to uniquely identify the target object when the target chip is detected within the detection range;
an obtaining module 402, configured to obtain public health information of a target object through a corresponding interface of a public health database based on object information of the target object;
and the control module 403 is configured to control the gate to be opened to release the target object when the public health information of the target object is in the validity period.
In some embodiments, fig. 5 is a block diagram of another information inspection apparatus provided according to an embodiment of the present application. The device is configured to perform the steps when the method is performed, as shown in fig. 5, and the obtaining module 402 is configured to determine the region information of the target object based on the object information of the target object; determining a public health database associated with the regional information based on the regional information of the target object; and obtaining public health information of the target object through a corresponding interface of the public health database.
In some embodiments, the decryption module 401 is configured to perform identity verification on the target chip if the target chip is detected within the detection range; and under the condition that the target chip is bound with the management system, decrypting the target chip to obtain the object information of the target object.
In some embodiments, referring to fig. 5, the apparatus further comprises:
the first reporting module 404 is configured to, when the target chip is not bound to the management system, report, by voice, a first prompt message, where the first prompt message is used to prompt that the target object is an unknown object.
In some embodiments, referring to fig. 5, the apparatus further comprises:
the determining module 405 is configured to determine a number of detection days of public health information of the target object, where the number of detection days is a number of days from a current time of a time of last health detection;
the second broadcasting module 406 is configured to broadcast the number of detection days in voice.
In some embodiments, referring to fig. 5, the apparatus further comprises:
the third reporting module 407 is configured to, when the public health information of the target object is not in the valid period, report, by voice, a second prompt message, where the second prompt message is used to prompt that the public health information of the target object has exceeded the valid period.
In some embodiments, referring to fig. 5, the apparatus further comprises:
and a deleting module 408, configured to delete the object information and public health information.
The embodiment of the application provides an information checking device, which can decrypt a target chip by detecting the target chip in a detection range, namely that a target object appears in the detection range, so as to obtain object information of the target object. Then, since the object information can uniquely identify the target object, public health information of the target object can be obtained through a corresponding interface of the public health database based on the object information of the target object. The public health information can reflect the health condition of the target object in a period of time, so that if the public health information is in the effective period, the current health condition of the target object is good, the gate is controlled to be opened, and the target object is released. The automatic information checking replaces manual information checking, so that the accuracy and efficiency of information checking are improved, and accurate management of people entering and exiting is realized.
It should be noted that: the information inspection device provided in the above embodiment is only exemplified by the above division of each functional module when an application is running, and in practical application, the above functional allocation may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to perform all or part of the functions described above. In addition, the information checking device and the information checking method provided in the foregoing embodiments belong to the same concept, and detailed implementation processes of the information checking device and the information checking method are detailed in the method embodiments and are not repeated here.
In the embodiment of the present application, the computer device may be configured as a terminal or a server, and when the computer device is configured as a terminal, the technical solution provided in the embodiment of the present application may be implemented by the terminal as an execution body, and when the computer device is configured as a server, the technical solution provided in the embodiment of the present application may be implemented by the server as an execution body, and also the technical solution provided in the present application may be implemented by interaction between the terminal and the server, which is not limited in this embodiment of the present application.
Fig. 6 is a block diagram of a terminal 600 according to an embodiment of the present application. The terminal 600 may be a portable mobile terminal such as: a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio Layer III, motion picture expert compression standard audio plane 3), an MP4 (Moving Picture Experts Group Audio Layer IV, motion picture expert compression standard audio plane 4) player, a notebook computer, or a desktop computer. Terminal 600 may also be referred to by other names of user devices, portable terminals, laptop terminals, desktop terminals, etc.
In general, the terminal 600 includes: a processor 601 and a memory 602.
Processor 601 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 601 may be implemented in at least one hardware form of DSP (Digital Signal Processing ), FPGA (Field-Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array ). The processor 601 may also include a main processor, which is a processor for processing data in an awake state, also called a CPU (Central Processing Unit ), and a coprocessor; a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 601 may be integrated with a GPU (Graphics Processing Unit, image processor) for taking care of rendering and rendering of content that the display screen is required to display. In some embodiments, the processor 601 may also include an AI (Artificial Intelligence ) processor for processing computing operations related to machine learning.
The memory 602 may include one or more computer-readable storage media, which may be non-transitory. The memory 602 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 602 is used to store at least one computer program for execution by processor 601 to implement the information pinging methods provided by the method embodiments herein.
In some embodiments, the terminal 600 may further optionally include: a peripheral interface 603, and at least one peripheral. The processor 601, memory 602, and peripheral interface 603 may be connected by a bus or signal line. The individual peripheral devices may be connected to the peripheral device interface 603 via buses, signal lines or a circuit board. Specifically, the peripheral device includes: at least one of radio frequency circuitry 604, a display 605, a camera assembly 606, audio circuitry 607, and a power supply 608.
Peripheral interface 603 may be used to connect at least one Input/Output (I/O) related peripheral to processor 601 and memory 602. In some embodiments, the processor 601, memory 602, and peripheral interface 603 are integrated on the same chip or circuit board; in some other embodiments, either or both of the processor 601, memory 602, and peripheral interface 603 may be implemented on separate chips or circuit boards, which is not limited in this embodiment.
The Radio Frequency circuit 604 is configured to receive and transmit RF (Radio Frequency) signals, also known as electromagnetic signals. The radio frequency circuit 604 communicates with a communication network and other communication devices via electromagnetic signals. The radio frequency circuit 604 converts an electrical signal into an electromagnetic signal for transmission, or converts a received electromagnetic signal into an electrical signal. In some embodiments, the radio frequency circuit 604 includes: antenna systems, RF transceivers, one or more amplifiers, tuners, oscillators, digital signal processors, codec chipsets, subscriber identity module cards, and so forth. The radio frequency circuit 604 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocol includes, but is not limited to: the world wide web, metropolitan area networks, intranets, generation mobile communication networks (2G, 3G, 4G, and 5G), wireless local area networks, and/or WiFi (Wireless Fidelity ) networks. In some embodiments, the radio frequency circuitry 604 may also include NFC (Near Field Communication, short range wireless communication) related circuitry, which is not limited in this application.
The display screen 605 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display 605 is a touch display, the display 605 also has the ability to collect touch signals at or above the surface of the display 605. The touch signal may be input as a control signal to the processor 601 for processing. At this point, the display 605 may also be used to provide virtual buttons and/or virtual keyboards, also referred to as soft buttons and/or soft keyboards. In some embodiments, the display 605 may be one, disposed on the front panel of the terminal 600; in other embodiments, the display 605 may be at least two, respectively disposed on different surfaces of the terminal 600 or in a folded design; in other embodiments, the display 605 may be a flexible display, disposed on a curved surface or a folded surface of the terminal 600. Even more, the display 605 may be arranged in a non-rectangular irregular pattern, i.e., a shaped screen. The display 605 may be made of LCD (Liquid Crystal Display ), OLED (Organic Light-Emitting Diode) or other materials.
The camera assembly 606 is used to capture images or video. In some embodiments, the camera assembly 606 includes a front camera and a rear camera. Typically, the front camera is disposed on the front panel of the terminal and the rear camera is disposed on the rear surface of the terminal. In some embodiments, the at least two rear cameras are any one of a main camera, a depth camera, a wide-angle camera and a tele camera, so as to realize that the main camera and the depth camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize a panoramic shooting and Virtual Reality (VR) shooting function or other fusion shooting functions. In some embodiments, camera assembly 606 may also include a flash. The flash lamp can be a single-color temperature flash lamp or a double-color temperature flash lamp. The dual-color temperature flash lamp refers to a combination of a warm light flash lamp and a cold light flash lamp, and can be used for light compensation under different color temperatures.
The audio circuit 607 may include a microphone and a speaker. The microphone is used for collecting sound waves of users and environments, converting the sound waves into electric signals, and inputting the electric signals to the processor 601 for processing, or inputting the electric signals to the radio frequency circuit 604 for voice communication. For the purpose of stereo acquisition or noise reduction, a plurality of microphones may be respectively disposed at different portions of the terminal 600. The microphone may also be an array microphone or an omni-directional pickup microphone. The speaker is used to convert electrical signals from the processor 601 or the radio frequency circuit 604 into sound waves. The speaker may be a conventional thin film speaker or a piezoelectric ceramic speaker. When the speaker is a piezoelectric ceramic speaker, not only the electric signal can be converted into a sound wave audible to humans, but also the electric signal can be converted into a sound wave inaudible to humans for ranging and other purposes. In some embodiments, the audio circuit 607 may also include a headphone jack.
The power supply 608 is used to power the various components in the terminal 600. The power source 608 may be alternating current, direct current, disposable or rechargeable. When the power source 608 includes a rechargeable battery, the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, the terminal 600 further includes one or more sensors 609. The one or more sensors 609 include, but are not limited to: acceleration sensor 610, gyroscope sensor 611, pressure sensor 612, optical sensor 613, and proximity sensor 614.
The acceleration sensor 610 may detect the magnitudes of accelerations on three coordinate axes of the coordinate system established with the terminal 600. For example, the acceleration sensor 610 may be used to detect components of gravitational acceleration in three coordinate axes. The processor 601 may control the display screen 605 to display the user interface in a landscape view or a portrait view according to the gravitational acceleration signal acquired by the acceleration sensor 610. The acceleration sensor 610 may also be used for the acquisition of motion data of a game or a user.
The gyro sensor 611 may detect a body direction and a rotation angle of the terminal 600, and the gyro sensor 611 may collect a 3D motion of the user to the terminal 600 in cooperation with the acceleration sensor 610. The processor 601 may implement the following functions based on the data collected by the gyro sensor 611: motion sensing (e.g., changing UI according to a tilting operation by a user), image stabilization at shooting, game control, and inertial navigation.
The pressure sensor 612 may be disposed at a side frame of the terminal 600 and/or at a lower layer of the display 605. When the pressure sensor 612 is disposed at a side frame of the terminal 600, a grip signal of the user to the terminal 600 may be detected, and the processor 601 performs a left-right hand recognition or a shortcut operation according to the grip signal collected by the pressure sensor 612. When the pressure sensor 612 is disposed at the lower layer of the display screen 605, the processor 601 controls the operability control on the UI interface according to the pressure operation of the user on the display screen 605. The operability controls include at least one of a button control, a scroll bar control, an icon control, and a menu control.
The optical sensor 613 is used to collect the intensity of ambient light. In one embodiment, processor 601 may control the display brightness of display 605 based on the intensity of ambient light collected by optical sensor 613. Specifically, when the intensity of the ambient light is high, the display brightness of the display screen 605 is turned up; when the ambient light intensity is low, the display brightness of the display screen 605 is turned down. In another embodiment, the processor 601 may also dynamically adjust the shooting parameters of the camera assembly 606 according to the ambient light intensity collected by the optical sensor 613.
A proximity sensor 614, also known as a distance sensor, is typically provided on the front panel of the terminal 600. The proximity sensor 614 is used to collect the distance between the user and the front of the terminal 600. In one embodiment, when the proximity sensor 614 detects that the distance between the user and the front of the terminal 600 gradually decreases, the processor 601 controls the display 605 to switch from the bright screen state to the off screen state; when the proximity sensor 614 detects that the distance between the user and the front surface of the terminal 600 gradually increases, the processor 601 controls the display screen 605 to switch from the off-screen state to the on-screen state.
Those skilled in the art will appreciate that the structure shown in fig. 6 is not limiting of the terminal 600 and may include more or fewer components than shown, or may combine certain components, or may employ a different arrangement of components.
The present application also provides a computer readable storage medium, in which at least one section of a computer program is stored, where the at least one section of the computer program is loaded and executed by a processor of a computer device to implement the operations performed by the computer device in the information checking method of the above embodiment. For example, the computer readable storage medium may be Read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), compact disc Read-Only Memory (Compact Disc Read-Only Memory, CD-ROM), magnetic tape, floppy disk, optical data storage device, and the like.
Embodiments of the present application also provide a computer program product or computer program comprising computer program code stored in a computer readable storage medium. The processor of the computer device reads the computer program code from the computer readable storage medium, and the processor executes the computer program code so that the computer device performs the information inspection method provided in the above-described various alternative implementations.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program for instructing relevant hardware, where the program may be stored in a computer readable storage medium, and the storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The foregoing description of the preferred embodiments is merely exemplary in nature and is in no way intended to limit the invention, since it is intended that all modifications, equivalents, improvements, etc. that fall within the spirit and scope of the invention.

Claims (10)

1. An information inspection method, the method comprising:
under the condition that a target chip is detected in a detection range, decrypting the target chip to obtain object information of a target object, wherein the object information is used for uniquely identifying the target object;
acquiring public health information of the target object through a corresponding interface of a public health database based on the object information of the target object;
and under the condition that the public health information of the target object is in the validity period, controlling the gate to be opened so as to release the target object.
2. The method according to claim 1, wherein the obtaining public health information of the target object through a corresponding interface of a public health database based on object information of the target object includes:
determining region information of the target object based on the object information of the target object;
determining the public health database associated with the regional information based on the regional information of the target object;
and acquiring public health information of the target object through a corresponding interface of the public health database.
3. The method according to claim 1, wherein, in the case that the target chip is detected within the detection range, decrypting the target chip to obtain the object information of the target object includes:
under the condition that the target chip is detected in the detection range, carrying out identity verification on the target chip;
and under the condition that the target chip is bound with a management system, decrypting the target chip to obtain the object information of the target object.
4. A method according to claim 3, characterized in that the method further comprises:
and under the condition that the target chip is not bound with the management system, broadcasting first prompt information in a voice mode, wherein the first prompt information is used for prompting that the target object is an unknown object.
5. The method according to claim 1, wherein the method further comprises:
determining the detection days of public health information of the target object, wherein the detection days are the days of the time for carrying out health detection last time from the current time;
and broadcasting the detection days through voice.
6. The method according to claim 1, wherein the method further comprises:
and under the condition that the public health information of the target object is not in the valid period, broadcasting second prompt information through voice, wherein the second prompt information is used for prompting that the public health information of the target object is out of date.
7. The method of claim 1, wherein the method further comprises, after the control gate is turned on if the public health information of the target object is in the validity period:
and deleting the object information and the public health information of the target object.
8. An information inspection apparatus, characterized in that the apparatus comprises:
the decryption module is used for decrypting the target chip to obtain object information of a target object under the condition that the target chip is detected in the detection range, and the object information is used for uniquely identifying the target object;
the acquisition module is used for acquiring the public health information of the target object through a corresponding interface of the public health database based on the object information of the target object;
and the control module is used for controlling the gate to be opened so as to release the target object under the condition that the public health information of the target object is in the validity period.
9. A computer device, characterized in that it comprises a processor and a memory for storing at least one piece of computer program, which is loaded by the processor and which performs the information checking method according to any one of claims 1 to 7.
10. A computer-readable storage medium storing at least one piece of computer program for executing the information inspection method according to any one of claims 1 to 7.
CN202211597229.9A 2022-12-12 2022-12-12 Information checking method, information checking device, computer equipment and storage medium Pending CN116246380A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211597229.9A CN116246380A (en) 2022-12-12 2022-12-12 Information checking method, information checking device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211597229.9A CN116246380A (en) 2022-12-12 2022-12-12 Information checking method, information checking device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116246380A true CN116246380A (en) 2023-06-09

Family

ID=86624977

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211597229.9A Pending CN116246380A (en) 2022-12-12 2022-12-12 Information checking method, information checking device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116246380A (en)

Similar Documents

Publication Publication Date Title
CN108363982B (en) Method and device for determining number of objects
CN113435621A (en) Reservation and data updating method, device, equipment and storage medium for epidemic prevention project
CN111027490A (en) Face attribute recognition method and device and storage medium
CN113879923B (en) Elevator control method, system, device, electronic equipment and storage medium
CN111931712B (en) Face recognition method, device, snapshot machine and system
CN107944024B (en) Method and device for determining audio file
CN113879924A (en) Elevator control method, elevator control device, electronic equipment and storage medium
CN113099378B (en) Positioning method, device, equipment and storage medium
CN113706807B (en) Method, device, equipment and storage medium for sending alarm information
CN111669611B (en) Image processing method, device, terminal and storage medium
CN112990424B (en) Neural network model training method and device
CN116246380A (en) Information checking method, information checking device, computer equipment and storage medium
CN112764824B (en) Method, device, equipment and storage medium for triggering identity verification in application program
CN109344284B (en) Song file playing method, device, equipment and storage medium
CN114078582A (en) Method, device, terminal and storage medium for associating service information
CN112749583A (en) Face image grouping method and device, computer equipment and storage medium
CN113495770A (en) Method, device, terminal and storage medium for displaying application page
CN111339513A (en) Data sharing method and device
CN111135571B (en) Game identification method, game identification device, terminal, server and readable storage medium
CN114615520B (en) Subtitle positioning method, subtitle positioning device, computer equipment and medium
CN114598516B (en) Information encryption and information decryption methods, devices, equipment and storage medium
CN110929675B (en) Image processing method, device, computer equipment and computer readable storage medium
CN110097368B (en) Face image recognition method, server, terminal and service equipment
CN110659609B (en) Fingerprint matching method and device, electronic equipment and medium
CN111049970B (en) Method and device for operating equipment, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination