CN117201603B - Coal mine underground data handover method and system based on two-dimension code - Google Patents

Coal mine underground data handover method and system based on two-dimension code Download PDF

Info

Publication number
CN117201603B
CN117201603B CN202311460733.9A CN202311460733A CN117201603B CN 117201603 B CN117201603 B CN 117201603B CN 202311460733 A CN202311460733 A CN 202311460733A CN 117201603 B CN117201603 B CN 117201603B
Authority
CN
China
Prior art keywords
data
dimensional code
code picture
picture
coal mine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311460733.9A
Other languages
Chinese (zh)
Other versions
CN117201603A (en
Inventor
龚浩杰
刘林
陈李侠
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tehuakemai Xi'an Information Technology Co ltd
Original Assignee
Tehuakemai Xi'an Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tehuakemai Xi'an Information Technology Co ltd filed Critical Tehuakemai Xi'an Information Technology Co ltd
Priority to CN202311460733.9A priority Critical patent/CN117201603B/en
Publication of CN117201603A publication Critical patent/CN117201603A/en
Application granted granted Critical
Publication of CN117201603B publication Critical patent/CN117201603B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The disclosure relates to a coal mine underground data handover method and system based on two-dimension codes, wherein the method comprises the following steps: the receiving end receives a two-dimensional code picture, wherein the two-dimensional code picture is generated after the sending end processes the coded data by using a two-dimensional code generating tool, and the coded data are data with an original data format which need to be handed over; the receiving end scans and analyzes the two-dimensional code picture by using a two-dimensional code scanning tool to restore the data corresponding to the two-dimensional code picture into an original data format, wherein an inverse algorithm is adopted to analyze the data of the scanned two-dimensional code picture when the two-dimensional code picture is analyzed; and entering a data filling page to fill and submit the data. According to the invention, data filling and handover are carried out by scanning the two-dimensional code pictures, and handover data with larger transmission quantity is obtained; and the data corresponding to the scanned two-dimensional code picture is analyzed by using a reverse algorithm, so that the data reduction processing is more stable, the acquired data is more complete, and errors are not easy to occur.

Description

Coal mine underground data handover method and system based on two-dimension code
Technical Field
The embodiment of the disclosure relates to the technical field of data processing, in particular to a coal mine underground data handover method and system based on two-dimension codes.
Background
With the development of information communication technology, a data interaction mode combining a mobile phone and a two-dimensional code has been developed, and the mode is greatly convenient for high-frequency data transmission in various industries. The technologies use a mobile application program as a tool for transferring the data report, a user can convert the data report into a two-dimensional code or other forms of images by installing a specific application on a mobile phone, and then the images are transmitted to a receiving end through a scanning device.
In some application scenarios of communication restrictions, such as underground operation of coal mine, the processing procedures of transmitting data, handing over report forms, etc. become very important in actual operation of projects due to the restrictions of various external environments and hardware conditions. However, because of various limitations of the related art, this data transmission method has the following drawbacks:
1. when the data report is acquired through the two-dimension code, the mobile application may be affected by system problems, software faults and the like, so that the data report is unstable in the recovery processing process, and the report data is incompletely acquired or is in error;
2. in the process of acquiring a data report through a two-dimensional code, the data storage and transmission quantity is limited due to the limited data bearing capacity of the two-dimensional code.
Accordingly, there is a need to improve one or more problems in the related art as described above.
It is noted that this section is intended to provide a background or context for the technical solutions of the present disclosure as set forth in the claims. The description herein is not admitted to be prior art by inclusion in this section.
Disclosure of Invention
The invention aims to provide a coal mine underground data handover method and system based on two-dimension codes, which further overcome one or more problems caused by the limitations and defects of the related art at least to a certain extent.
The invention firstly provides a coal mine underground data handover method based on two-dimension codes, which comprises the following steps:
the receiving terminal receives a two-dimensional code picture sent by the sending terminal, wherein the two-dimensional code picture is generated by the sending terminal after processing encoded data by using a two-dimensional code generating tool, and the encoded data are data with an original data format which need to be handed over;
the receiving end scans and analyzes the two-dimensional code picture by using a two-dimensional code scanning tool to restore data corresponding to the two-dimensional code picture into an original data format, wherein an inverse algorithm is adopted to analyze the scanned data of the two-dimensional code picture when the two-dimensional code picture is analyzed;
the receiving end enters a data filling page to fill data and submits filling data.
In the invention, the two-dimensional code picture comprises a first-layer two-dimensional code and a plurality of lower-layer two-dimensional codes associated with the first-layer two-dimensional code.
In the invention, the steps of the receiving end utilizing a two-dimension code scanning tool to scan and analyze the two-dimension code picture and restoring the data corresponding to the two-dimension code picture into an original data format comprise the following steps:
a local database is preset and used for storing local data corresponding to the original data;
setting a locator for the two-dimensional code picture, wherein the locator is used for being linked to corresponding local data;
and when the two-dimensional code picture is scanned, the corresponding local data is acquired through the locator to complete data restoration.
In the invention, the step of analyzing the scanned data of the two-dimensional code picture by adopting a reverse algorithm when analyzing the two-dimensional code picture comprises the following steps:
analyzing key information in the coding characters of the two-dimensional code picture, wherein the key information comprises a data structure and a coding mode;
and processing the analyzed data by adopting a reverse algorithm to obtain the data restored to the original data format, wherein the reverse algorithm comprises data operation, logic operation and conversion rules.
In the invention, when submitting the filling data, judging whether the network is smooth, if the network connection fails, storing the filling data locally, and if the network connection is successful, submitting the filling data.
According to the method, verification information is set for the two-dimensional code scanning tool, and when the two-dimensional code scanning tool is used for scanning the two-dimensional code picture, the two-dimensional code picture is analyzed when the verification information has analysis rights.
The invention also provides a coal mine underground data handover system based on the two-dimension code, which comprises:
the sending end converts the handed over data into a encodable format and encodes the same, and generates a corresponding two-dimensional code picture by utilizing a two-dimensional code generating tool, wherein the encoded data is the data with the original data format which needs to be handed over;
the receiving end receives the two-dimensional code picture sent by the sending end;
the receiving end scans and analyzes the two-dimensional code picture by using a two-dimensional code scanning tool to restore data corresponding to the two-dimensional code picture into an original data format, wherein an inverse algorithm is adopted to analyze the scanned data of the two-dimensional code picture when the two-dimensional code picture is analyzed;
the receiving end enters a data filling page to fill data and submits filling data.
The technical scheme provided by the invention can comprise the following beneficial effects:
according to the coal mine underground data handover method and system based on the two-dimension codes, the handover data with larger transmission quantity can be obtained by scanning the two-dimension code pictures to carry out data reporting and handover; and analyzing the scanned data corresponding to the two-dimensional code picture by using a reverse algorithm, so that the data reduction processing is more stable, the acquired data is more complete, and errors are not easy to occur.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. It will be apparent to those of ordinary skill in the art that the drawings in the following description are merely examples of the disclosure and that other drawings may be derived from them without undue effort.
Fig. 1 shows a flow diagram of a two-dimensional code-based coal mine downhole data handover method in an exemplary embodiment of the present disclosure;
fig. 2 is a schematic flow chart of a receiving end in an exemplary embodiment of the disclosure, in which a two-dimensional code scanning tool is used to scan and parse a two-dimensional code picture to restore data corresponding to the two-dimensional code picture to an original data format;
fig. 3 is a schematic flow chart of resolving data of a scanned two-dimensional code picture by using a reverse algorithm when resolving the two-dimensional code picture in an exemplary embodiment of the disclosure;
fig. 4 illustrates a schematic structure of an electronic device in an exemplary embodiment of the present disclosure;
fig. 5 illustrates a schematic structure of a program product for implementing a two-dimensional code-based coal mine downhole data handover method in an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of embodiments of the disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities.
In this example embodiment, first, a method for handover of coal mine underground data based on two-dimension codes is provided, referring to fig. 1, the method may include: step S101 to step S103. The method comprises the following steps:
step S101, a receiving end receives a two-dimensional code picture sent by a sending end, wherein the two-dimensional code picture is generated by the sending end after processing encoded data by using a two-dimensional code generating tool, and the encoded data are data with an original data format which need to be handed over. Before encoding at the sender, a writer is required to convert the original data report into a format suitable for encoding. This process requires consideration of the structure and size of the data and ensures that the encoded data is not lost or corrupted.
The two-dimensional code plays a key role as a data sharing medium. In practical application, a two-dimensional code generation library can be used for generating corresponding two-dimensional code pictures from the encoded data. The size and fault tolerance of the two-dimensional code need to be adjusted according to actual conditions so as to ensure stable analysis under different environments.
Step S102, a receiving end scans and analyzes the two-dimensional code picture by using a two-dimensional code scanning tool to restore data corresponding to the two-dimensional code picture into an original data format, wherein an inverse algorithm is adopted to analyze the scanned data of the two-dimensional code picture when the two-dimensional code picture is analyzed.
Step S103, the receiving end enters a data filling page to carry out data filling and submits filling data. The fill-in content may include entering text information, taking photographs or other necessary data records, etc.
In this embodiment, the two-dimensional code image is scanned to perform data reporting and handover, so that handover data with larger transmission quantity can be obtained; and analyzing the scanned data corresponding to the two-dimensional code picture by using a reverse algorithm, so that the data reduction processing is more stable, the acquired data is more complete, and errors are not easy to occur.
It should be noted that, in order to obtain a larger data transmission amount, the two-dimensional code picture includes a first layer two-dimensional code and a plurality of lower layer two-dimensional codes associated with the first layer two-dimensional code. And acquiring information carried in the two-dimensional codes by scanning the plurality of lower-layer two-dimensional codes, and performing data reduction.
On the basis of the above embodiment, please refer to fig. 2, in step S102, the step of the receiving end using a two-dimensional code scanning tool to scan and parse the two-dimensional code picture to restore the data corresponding to the two-dimensional code picture to the original data format includes:
step S201, a local database is preset for storing local data corresponding to the original data. The local data corresponding to the original data stored in the local database may be report elements or the like.
Step S202, setting a locator for the two-dimensional code picture, for linking to corresponding local data.
Step S203, when scanning the two-dimension code picture, the corresponding local data is obtained through the locator to complete data restoration.
In this embodiment, the two-dimensional code picture stores the locator, the locator is obtained by scanning the two-dimensional code picture, the target data corresponding to the locator is determined by the locator and the local data, and the target data corresponding to all the locators form the whole report, so as to complete data reduction.
In addition, the data reduction process may involve rearranging, organizing, and formatting the data to conform to the structure of the original data report. This ensures that the resulting data is consistent with the original report and can be understood and processed normally.
In some embodiments, referring to fig. 3, in step S102, the step of analyzing the scanned data of the two-dimensional code picture by using an inverse algorithm includes:
step S301, analyzing key information in the encoded characters of the two-dimensional code picture, where the key information includes a data structure and an encoding mode. The two-dimensional code data acquired by the scanning device is a string of encoded characters or numbers. The parsing program is responsible for decomposing these characters and identifying key information therein, such as the structure of data, the encoding scheme, etc., but is not limited thereto.
In step S302, the parsed data is processed by an inverse algorithm to obtain the data restored to the original data format, where the inverse algorithm includes data operation, logic operation and conversion rules. The data is parsed out and the inverse algorithm will begin processing the data. This algorithm may utilize a variety of mathematical operations, logical operations, and specific transformation rules, which may be predefined when the analysis program is being formulated. The main goal of the inverse algorithm is to restore the encoded or converted data to the original data reporting format. This can gradually cancel the previous encoding operations according to rules in the parsing program, and restore the original structure and content of the data. The complexity of the reverse algorithm depends on the coding mode of the two-dimensional code and the complexity of data conversion. When the reverse algorithm is designed, the integrity and the accuracy of the data are required to be considered, so that the restored data can truly reflect the information in the original data report.
In step S103, when submitting the filling data, judging whether the network is smooth, if the network connection fails, storing the filling data locally, so as to ensure that any filling content is not lost; and if the network connection is successful, submitting the filled data. The data filled by the user is stored in a local cache to ensure that the data can be saved even without a network. Once the network is reconnected, the system automatically detects and provides a one-touch commit portal. After the user clicks the submit button, all locally cached data is automatically uploaded to the server.
Further, in this embodiment, when uploading the local cache data to the server, the method includes the following steps:
acquiring a data identifier of local cache data, and determining a data attribute parameter corresponding to the local cache data from a database according to the data identifier;
determining a storage parameter according to the data attribute parameter, the data generation time length and the data caching time length of the local cache data;
and determining the uploading priority according to the storage parameters so as to upload the local cache data to the server based on the uploading priority.
Specifically, each local cache data in this embodiment has a corresponding data identifier, that is, a data name, and according to a corresponding relationship between the data identifier and the database, a data attribute parameter corresponding to the data identifier is determined, where the data attribute parameter in this embodiment is used to represent an attribute of data, that is, application performance, production performance, and so on. After the data attribute parameters are acquired, according to the data attribute parametersData generation duration->Data cache durationDetermining the storage parameter as +.>
Wherein,、/>the generation factor and the cache factor are respectively represented, and the storage parameter is obtained by calculation based on the data attribute parameter, the data generation time length and the data cache time length, and is used for measuring the uploading priority of the data through the storage parameter, wherein the higher the storage parameter is, the higher the representing priority is, and the data needs to be uploaded to a server in time so as to ensure the efficiency of data application.
In addition, in some embodiments, verification information may be set for the two-dimensional code scanning tool, and when the two-dimensional code scanning tool is used to scan the two-dimensional code picture, the two-dimensional code picture is parsed when the verification information has the parsing right. Strict identity verification is added, and because the method is only aimed at the handover of the underground data report in the coal mine industry, the identity and equipment double verification is added after each equipment scans the two-dimension code. And data filling and modification can be only performed by specific equipment and specific account numbers, so that the safety of data transmission is improved.
The embodiment of the present invention provides a two-dimensional code-based underground coal mine data handover system, which includes:
the sending end converts the handed over data into a encodable format and encodes the same, and generates a corresponding two-dimensional code picture by utilizing a two-dimensional code generating tool, wherein the encoded data is the data with the original data format which needs to be handed over;
the receiving end receives the two-dimensional code picture sent by the sending end;
the receiving end scans and analyzes the two-dimensional code picture by using a two-dimensional code scanning tool to restore data corresponding to the two-dimensional code picture into an original data format, wherein an inverse algorithm is adopted to analyze the scanned data of the two-dimensional code picture when the two-dimensional code picture is analyzed;
the receiving end enters a data filling page to fill data and submits filling data.
In this embodiment, the two-dimensional code image is scanned to perform data reporting and handover, so that handover data with larger transmission quantity can be obtained; and analyzing the scanned data corresponding to the two-dimensional code picture by using a reverse algorithm, so that the data reduction processing is more stable, the acquired data is more complete, and errors are not easy to occur.
In some embodiments, the two-dimensional code picture comprises a first-layer two-dimensional code and a plurality of lower-layer two-dimensional codes associated with the first-layer two-dimensional code; judging whether the network is unblocked or not when submitting the data, if the network connection fails, storing the data in the local area, and if the network connection is successful, submitting the data; the two-dimensional code scanning tool can be provided with verification information, and when the two-dimensional code scanning tool is utilized to scan the two-dimensional code picture, the two-dimensional code picture is analyzed when the verification information has analysis rights.
It should be noted that the implementation procedure and the beneficial effects of the functions of the above two modules are similar to those of the foregoing embodiments, and are not repeated here.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
It should be noted that although several modules of the system for action execution are mentioned in the detailed description above, this partitioning is not mandatory. Indeed, the features and functions of two or more modules described above may be embodied in one module in accordance with embodiments of the present invention. Conversely, the features and functions of one module described above may be further divided into a plurality of modules to be embodied. The components shown as modules may or may not be physical units, may be located in one place, or may be distributed across multiple network elements. Some or all modules can be selected according to actual needs to realize the purpose of the wood invention scheme. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
Referring to fig. 4, an embodiment of the present invention also provides an electronic device 300, the electronic device 300 comprising at least one memory 310, at least one processor 320, and a bus 330 connecting the different platform systems.
Memory 310 may include readable media in the form of volatile memory, such as Random Access Memory (RAM) 311 and/or cache memory 312, and may further include Read Only Memory (ROM) 313.
The memory 310 further stores a computer program, where the computer program may be executed by the processor 320, so that the processor 320 executes the steps of the two-dimensional code-based coal mine underground data handover method in any embodiment of the present invention, and a specific implementation manner of the method is consistent with the implementation manner and the achieved technical effect described in the embodiment of the two-dimensional code-based coal mine underground data handover method, and some contents are not repeated.
Memory 310 may also include utility 314 having at least one program module 315, such program modules 315 include, but are not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Accordingly, processor 320 may execute the computer programs described above, as well as may execute utility 314.
Bus 330 may represent one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures.
The electronic device 300 may also communicate with one or more external devices 340, such as a keyboard, pointing device, bluetooth device, etc., as well as with one or more devices capable of interacting with the electronic device 300, and/or with any device (e.g., router, modem, etc.) that enables the electronic device 300 to communicate with one or more other computing devices. Such communication may occur through input-output interface 350. Also, electronic device 300 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 360. The network adapter 360 may communicate with other modules of the electronic device 300 via the bus 330. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 300, including, but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, data backup storage platforms, and the like.
The embodiment of the invention also provides a computer readable storage medium, which is used for storing a computer program, and the computer program is executed to realize the steps of the coal mine underground data handover method based on the two-dimension code in the embodiment of the invention, and the specific implementation manner of the computer readable storage medium is consistent with the implementation manner and the achieved technical effect of the embodiment of the coal mine underground data handover method based on the two-dimension code, and part of the contents are not repeated.
Fig. 5 illustrates a program product 400 for implementing the two-dimensional code based coal mine downhole data handover method provided in this embodiment, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product 400 of the present invention is not limited thereto, and in the present invention, the readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. Program product 400 may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can transmit, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing. Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the C programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are to be protected by the present invention.

Claims (8)

1. The coal mine underground data handover method based on the two-dimension code is characterized by comprising the following steps of:
the receiving terminal receives a two-dimensional code picture sent by the sending terminal, wherein the two-dimensional code picture is generated by the sending terminal after processing encoded data by using a two-dimensional code generating tool, and the encoded data are data with an original data format which need to be handed over;
the receiving end scans and analyzes the two-dimensional code picture by using a two-dimensional code scanning tool to restore data corresponding to the two-dimensional code picture into an original data format, wherein an inverse algorithm is adopted to analyze the scanned data of the two-dimensional code picture when the two-dimensional code picture is analyzed;
the receiving end enters a data filling page to fill data and submits filling data;
judging whether the network is unblocked or not when submitting the filling data, if the network connection fails, storing the filling data locally, and if the network connection is successful, automatically uploading locally cached data to a server;
when uploading the locally cached data to a server, the method comprises the following steps:
acquiring a data identifier of local cache data, and determining a data attribute parameter corresponding to the local cache data from a database according to the data identifier;
determining a storage parameter according to the data attribute parameter, the data generation time length and the data caching time length of the local cache data;
determining an uploading priority according to the storage parameters so as to upload the local cache data to a server based on the uploading priority;
each local cache data has a corresponding data identifier, and a data attribute parameter corresponding to the data identifier is determined according to the corresponding relation between the data identifier and the database;
after the data attribute parameters are acquired, determining that the storage parameters are Par_sto according to the data attribute parameters Par_att, the data generation time Tim_gen and the data cache time Tim_cac:
wherein, alpha and beta respectively represent a generation factor and a buffer factor.
2. The two-dimensional code-based coal mine underground data handover method according to claim 1, wherein the two-dimensional code picture comprises a first-layer two-dimensional code and a plurality of lower-layer two-dimensional codes associated with the first-layer two-dimensional code.
3. The method for transferring data in a coal mine well based on two-dimension codes according to claim 1, wherein the step of the receiving end scanning and analyzing the two-dimension code picture by using a two-dimension code scanning tool to restore the data corresponding to the two-dimension code picture to an original data format comprises the following steps:
a local database is preset and used for storing local data corresponding to the original data;
setting a locator for the two-dimensional code picture, wherein the locator is used for being linked to corresponding local data;
and when the two-dimensional code picture is scanned, the corresponding local data is acquired through the locator to complete data restoration.
4. The method for transferring data in a coal mine well based on two-dimension codes according to claim 1, wherein the step of analyzing the scanned data of the two-dimension code picture by using a reverse algorithm when analyzing the two-dimension code picture comprises the following steps:
analyzing key information in the coding characters of the two-dimensional code picture, wherein the key information comprises a data structure and a coding mode;
and processing the analyzed data by adopting a reverse algorithm to obtain the data restored to the original data format, wherein the reverse algorithm comprises data operation, logic operation and conversion rules.
5. The method for transferring underground coal mine data based on the two-dimensional code according to claim 1, wherein verification information is set for the two-dimensional code scanning tool, and when the two-dimensional code scanning tool is utilized to scan the two-dimensional code picture, the two-dimensional code picture is analyzed when the verification information has analysis rights.
6. Colliery is data handing-over system in pit based on two-dimensional code, its characterized in that, the system includes:
the sending end converts the handed over data into a encodable format and encodes the same, and generates a corresponding two-dimensional code picture by utilizing a two-dimensional code generating tool, wherein the encoded data is the data with the original data format which needs to be handed over;
the receiving end receives the two-dimensional code picture sent by the sending end;
the receiving end scans and analyzes the two-dimensional code picture by using a two-dimensional code scanning tool to restore data corresponding to the two-dimensional code picture into an original data format, wherein an inverse algorithm is adopted to analyze the scanned data of the two-dimensional code picture when the two-dimensional code picture is analyzed;
the receiving end enters a data filling page to fill data and submits filling data;
judging whether the network is unblocked or not when submitting the filling data, if the network connection fails, storing the filling data locally, and if the network connection is successful, automatically uploading locally cached data to a server;
when uploading the local cache data to the server, the method comprises the following steps:
acquiring a data identifier of local cache data, and determining a data attribute parameter corresponding to the local cache data from a database according to the data identifier;
determining a storage parameter according to the data attribute parameter, the data generation time length and the data caching time length of the local cache data;
determining an uploading priority according to the storage parameters so as to upload the local cache data to a server based on the uploading priority;
each local cache data has a corresponding data identifier, and a data attribute parameter corresponding to the data identifier is determined according to the corresponding relation between the data identifier and the database;
after the data attribute parameters are acquired, according to the data attribute parametersDuration of data generationData buffer time length +.>Determining the storage parameter as +.>
Wherein,、/>representing the generation factor and the buffer factor, respectively.
7. The two-dimensional code based coal mine downhole data handing-over system of claim 6, wherein the two-dimensional code pictures comprise a first layer two-dimensional code and a plurality of lower layer two-dimensional codes associated with the first layer two-dimensional code.
8. The two-dimensional code based coal mine underground data handover system according to claim 6, wherein check information is set for the two-dimensional code scanning tool, and when the two-dimensional code scanning tool is used for scanning the two-dimensional code picture, the two-dimensional code picture is analyzed when the check information has analysis rights.
CN202311460733.9A 2023-11-06 2023-11-06 Coal mine underground data handover method and system based on two-dimension code Active CN117201603B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311460733.9A CN117201603B (en) 2023-11-06 2023-11-06 Coal mine underground data handover method and system based on two-dimension code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311460733.9A CN117201603B (en) 2023-11-06 2023-11-06 Coal mine underground data handover method and system based on two-dimension code

Publications (2)

Publication Number Publication Date
CN117201603A CN117201603A (en) 2023-12-08
CN117201603B true CN117201603B (en) 2024-02-06

Family

ID=88990879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311460733.9A Active CN117201603B (en) 2023-11-06 2023-11-06 Coal mine underground data handover method and system based on two-dimension code

Country Status (1)

Country Link
CN (1) CN117201603B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104158668A (en) * 2014-09-09 2014-11-19 北京数字认证股份有限公司 Method and system for realizing electronic signature
CN109194451A (en) * 2018-08-17 2019-01-11 北汽福田汽车股份有限公司 The data of car-mounted terminal reissue method and car-mounted terminal
CN109284304A (en) * 2018-08-13 2019-01-29 中国平安人寿保险股份有限公司 A kind of electronics based on caching technology goes out folk prescription method and terminal device
CN109726786A (en) * 2017-10-31 2019-05-07 北京京东尚科信息技术有限公司 Two-dimensional barcode information reading, generation method and device
CN111585960A (en) * 2020-04-02 2020-08-25 金航数码科技有限责任公司 Two-dimensional code data transmission system and method based on internal and external network isolation
CN111860730A (en) * 2020-08-27 2020-10-30 南京轩宁信息技术有限公司 Different network information transmission system based on image processing

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110019865B (en) * 2017-09-08 2021-01-26 北京京东尚科信息技术有限公司 Mass image processing method and device, electronic equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104158668A (en) * 2014-09-09 2014-11-19 北京数字认证股份有限公司 Method and system for realizing electronic signature
CN109726786A (en) * 2017-10-31 2019-05-07 北京京东尚科信息技术有限公司 Two-dimensional barcode information reading, generation method and device
CN109284304A (en) * 2018-08-13 2019-01-29 中国平安人寿保险股份有限公司 A kind of electronics based on caching technology goes out folk prescription method and terminal device
CN109194451A (en) * 2018-08-17 2019-01-11 北汽福田汽车股份有限公司 The data of car-mounted terminal reissue method and car-mounted terminal
CN111585960A (en) * 2020-04-02 2020-08-25 金航数码科技有限责任公司 Two-dimensional code data transmission system and method based on internal and external network isolation
CN111860730A (en) * 2020-08-27 2020-10-30 南京轩宁信息技术有限公司 Different network information transmission system based on image processing

Also Published As

Publication number Publication date
CN117201603A (en) 2023-12-08

Similar Documents

Publication Publication Date Title
CN110119643B (en) Two-dimensional code generation method and device and two-dimensional code identification method and device
US7924183B2 (en) Method and system for reducing required storage during decompression of a compressed file
CN107395209B (en) Data compression method, data decompression method and equipment thereof
CN101495998A (en) Encoding of markup-language data
CN107404418B (en) Internet product testing method, device, equipment and storage medium
CN112685029A (en) Visual template generation method, device, equipment and storage medium
CN108040045B (en) Access flow file generation method and device, server and storage medium
CN110780860A (en) Generation method and device of table building script, computer equipment and storage medium
US20150201020A1 (en) Method and apparatus for storing network data
KR20080032100A (en) Unified storage security model
CN111984303A (en) Transaction data processing method, device, equipment and storage medium
CN110807111A (en) Three-dimensional graph processing method and device, storage medium and electronic equipment
CN111258832A (en) Interface parameter checking method, device, equipment and medium
CN117201603B (en) Coal mine underground data handover method and system based on two-dimension code
CN113268453A (en) Log information compression storage method and device
CN112491421A (en) Analysis method, device, equipment and medium for log file compression package
CN111913938A (en) Data migration method, system, device, electronic equipment and medium
CN114281480B (en) Container mirror image file processing method, device, equipment and storage medium
CN111967001A (en) Decoding and coding safety isolation method based on double containers
CN111651188A (en) Data result determining method, device, equipment and storage medium for differential packet
CN112733190B (en) Data processing method, device, electronic equipment, system and storage medium
CN111290758A (en) Module decoupling method and device, computer readable storage medium and electronic device
CN111866767A (en) Message processing method and device, electronic equipment and readable medium
CN117234683A (en) Data processing system and data processing method based on distributed server
CN117708050A (en) Data processing method, device, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant