CN117523367A - Blockchain system for tool management - Google Patents

Blockchain system for tool management Download PDF

Info

Publication number
CN117523367A
CN117523367A CN202311544399.5A CN202311544399A CN117523367A CN 117523367 A CN117523367 A CN 117523367A CN 202311544399 A CN202311544399 A CN 202311544399A CN 117523367 A CN117523367 A CN 117523367A
Authority
CN
China
Prior art keywords
target
tool
blockchain system
node
borrowing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311544399.5A
Other languages
Chinese (zh)
Inventor
郭若昊
陈强
张磊
聂航
余涛
许凯
吴钊
黄晓晖
朱明岗
陈创佳
董俊杰
金垚
周霄
张立中
文铭
黄业达
章剑雄
卢伟裕
苏铭浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maintenance and Test Branch of Peaking FM Power Generation of Southern Power Grid Co Ltd
Original Assignee
Maintenance and Test Branch of Peaking FM Power Generation of Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maintenance and Test Branch of Peaking FM Power Generation of Southern Power Grid Co Ltd filed Critical Maintenance and Test Branch of Peaking FM Power Generation of Southern Power Grid Co Ltd
Priority to CN202311544399.5A priority Critical patent/CN117523367A/en
Publication of CN117523367A publication Critical patent/CN117523367A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/94Hardware or software architectures specially adapted for image or video understanding
    • G06V10/95Hardware or software architectures specially adapted for image or video understanding structured as a network, e.g. client-server architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/751Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/82Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/60Type of objects
    • G06V20/64Three-dimensional objects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V2201/00Indexing scheme relating to image or video recognition or understanding
    • G06V2201/06Recognition of objects for industrial automation

Abstract

The present application relates to a blockchain system for tool management. The blockchain system comprises a user node and an administrator node; the user node is configured to obtain a spatial point cloud of a target tool, upload the spatial point cloud to a blockchain system, so that the blockchain system generates a target three-dimensional model of the target tool according to the received spatial point cloud, and send a first abnormal alarm to the administrator node when the target three-dimensional model is not matched with an original three-dimensional model of the target tool; the manager node is configured to generate a damage message for the target tool when the first anomaly alert is received. By adopting the system, the damage condition of the tools and the instruments can be found in time, and an administrator is informed of repairing the damaged tools and the instruments in time, so that the influence on the next normal use of the tools and the instruments is avoided.

Description

Blockchain system for tool management
Technical Field
The present application relates to the field of blockchain technology, and in particular, to a blockchain system for tool management.
Background
The tools and the appliances are collectively called tools and appliances used in industrial production, the power plant tools and the appliances are various in variety, various in form and non-uniform in size and specification, so that certain difficulty exists in the management of the tools and the appliances, and the management process is particularly obvious in the warehouse management process of the power plant tools and the appliances.
At present, the manual mode is generally adopted to manage the tool borrowing and returning condition of the power plant warehouse, because the power plant tool possibly has damage in the use process, when the tool returns, the tool can not be found to be damaged under the condition that the administrator checks the tool not carefully or the expertise is insufficient, the damaged tool is not repaired in time, and the next normal use of the tool is affected.
Therefore, the current power plant tool management technology has the problem that tools are not found to be damaged in time.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a blockchain system that can timely discover a damaged tool, and a tool management method, apparatus, computer device, computer readable storage medium, and computer program product.
In a first aspect, the present application provides a blockchain system for tool management. The blockchain system comprises a user node and an administrator node;
the user node is configured to obtain a spatial point cloud of a target tool, upload the spatial point cloud to a blockchain system, so that the blockchain system generates a target three-dimensional model of the target tool according to the received spatial point cloud, and send a first abnormal alarm to the administrator node when the target three-dimensional model is not matched with an original three-dimensional model of the target tool;
The manager node is configured to generate a damage message for the target tool when the first anomaly alert is received.
In one embodiment, the user node is provided with a depth camera, and the depth camera is used for acquiring a space point cloud of the target tool.
In one embodiment, the administrator node is further configured to obtain a tool identifier and tool information of the target tool, and perform uplink certification on the blockchain system by using the tool identifier and the tool information; the tool information includes the original three-dimensional model of the target tool.
In one embodiment, the user node is further configured to upload a first borrowing request for the target appliance to the blockchain system, where the blockchain system searches for the target appliance according to the received first borrowing request, and generates a borrowing record associated with an appliance identifier of the target appliance if the target appliance is found; the borrowing record includes a borrowing status and a borrowing object of the target fixture.
In one embodiment, the user node is further configured to upload a first return request for the target tool to the blockchain system, and the blockchain system updates the borrowing status in the borrowing record from unreturned to returned according to the received first return request.
In one embodiment, the user node is further configured to upload a second borrowing request for the target tool to the blockchain system when the blockchain system does not find the target tool, and if the blockchain system receives the second borrowing request, update the borrowed object in the borrowing record if a second return request for the target tool uploaded by another user node is also received.
In one embodiment, the borrowing record further includes a target return time of the target tool, and the blockchain system sends a second anomaly alert to the administrator node if the borrowing status of the target tool is unreturned and the current time exceeds the target return time;
the manager node is used for generating overdue return information aiming at the target tool under the condition that the second abnormal alarm is received.
In one embodiment, the tool information further includes a target maintenance time of the target tool; and the blockchain system sends a timing maintenance notification to the manager node under the condition that the current time is matched with the target maintenance time.
In one embodiment, the tool information further includes an authorized user corresponding to the target tool; the user node is further configured to obtain, from the blockchain system, an authorized user corresponding to the target tool when a query request of the target user for the target tool is received, and if the target user is within the range of the authorized user, display a borrowed record of the target tool.
In one embodiment, the administrator node and the user node are both provided with a code scanner, and the code scanner is used for scanning the identification code on the target tool to obtain the tool identifier of the target tool corresponding to the identification code.
In a second aspect, the present application provides a tool management method. The method comprises the following steps:
receiving a space point cloud of a target tool uploaded by a user node;
Generating a target three-dimensional model of the target tool according to the space point cloud;
sending a first anomaly alert to an administrator node if the target three-dimensional model does not match the original three-dimensional model of the target tool; the manager node generates a damage message for the target tool upon receiving the first anomaly alert.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory storing a computer program and a processor which when executing the computer program performs the steps of:
receiving a space point cloud of a target tool uploaded by a user node;
generating a target three-dimensional model of the target tool according to the space point cloud;
sending a first anomaly alert to an administrator node if the target three-dimensional model does not match the original three-dimensional model of the target tool; the manager node generates a damage message for the target tool upon receiving the first anomaly alert.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
Receiving a space point cloud of a target tool uploaded by a user node;
generating a target three-dimensional model of the target tool according to the space point cloud;
sending a first anomaly alert to an administrator node if the target three-dimensional model does not match the original three-dimensional model of the target tool; the manager node generates a damage message for the target tool upon receiving the first anomaly alert.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of:
receiving a space point cloud of a target tool uploaded by a user node;
generating a target three-dimensional model of the target tool according to the space point cloud;
sending a first anomaly alert to an administrator node if the target three-dimensional model does not match the original three-dimensional model of the target tool; the manager node generates a damage message for the target tool upon receiving the first anomaly alert.
The blockchain system, the tool management method, the computer equipment, the storage medium and the computer program product acquire the space point cloud of the target tool through the user node, upload the space point cloud to the blockchain system, generate a target three-dimensional model of the target tool according to the received space point cloud, send a first abnormal alarm to the manager node when the target three-dimensional model is not matched with the original three-dimensional model of the target tool, and generate a damage message aiming at the target tool when the manager node receives the first abnormal alarm; the method has the advantages that when a user returns the tool, the space point cloud of the tool can be obtained in real time, the current three-dimensional model of the tool is restored according to the space point cloud, the current three-dimensional model is compared with the original three-dimensional model of the tool which is stored in advance on the blockchain, and when the current three-dimensional model and the original three-dimensional model are not matched, an alarm is sent to an administrator node, so that the damage condition of the tool can be found in time, and then the administrator is informed of repairing the damaged tool in time, and the influence on the next normal use of the tool is avoided.
Drawings
FIG. 1 is a block diagram of a blockchain system for tool management in one embodiment;
FIG. 2 is a flow diagram of a blockchain system method for tool management in one embodiment;
FIG. 3 is an internal block diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In one embodiment, as shown in FIG. 1, a blockchain system for appliance management is provided, the blockchain system including a user node 102 and an administrator node 104;
a user node 102, configured to obtain a space point cloud of a target tool, upload the space point cloud to a blockchain system, so that the blockchain system generates a target three-dimensional model of the target tool according to the received space point cloud, and send a first anomaly alarm to an administrator node when the target three-dimensional model is not matched with an original three-dimensional model of the target tool;
an administrator node 104 for generating a damage message for the target tool in the event of receipt of the first anomaly alert.
The user node may be a terminal or a server used by the user. The administrator node may be a terminal or server used by an administrator.
The target tool may be a tool that the user is returning to.
The three-dimensional model of the target may be a three-dimensional model of the target tool when returning, including but not limited to a three-dimensional contour or a part name when returning the target tool.
The original three-dimensional model may be a three-dimensional model of the target tool when the tool information is first chained, including, but not limited to, a three-dimensional contour or a part name of the target tool when the tool information is first chained.
Wherein the first abnormal alarm may be an alarm signal indicating that the target tool is damaged.
In a specific implementation, a blockchain system can be configured for a power plant warehouse, wherein the blockchain system comprises user nodes and manager nodes, the user nodes can be arranged at and near the power plant warehouse, and the manager nodes can be arranged at and near the power plant warehouse or not. The code scanner and the depth camera can be configured for the user node, and identification codes are arranged on all borrowed and non-borrowed tools of the power plant warehouse, and include but are not limited to bar codes, two-dimensional codes or radio frequency tags.
When a user needs to return the tool, the code scanner can be used for scanning the identification code on the target tool to obtain the tool identification of the target tool, the depth camera can shoot the target tool to obtain the space point cloud of the target tool, and the user node uploads the tool identification and the space point cloud of the target tool to the blockchain system.
The blockchain system can generate a current target three-dimensional model of the target tool according to the space point cloud, compare the obtained target three-dimensional model with the original three-dimensional model, if the two models are matched, the situation that the tool is damaged does not exist, the returning information of the target tool can be continuously registered in the borrowing record, otherwise, if the two models are not matched, the situation that the tool is damaged exists, the blockchain system can generate a first abnormal alarm, and the first abnormal alarm is sent to an administrator node. When the manager node receives the first abnormal alarm, a message that the target tool is damaged can be displayed on the display, so that the manager is informed of timely repairing the damaged target tool, and the influence on the next use is avoided.
In practical application, the current target three-dimensional contour of the target tool can be compared with the original three-dimensional contour of the target tool pre-stored in the blockchain system, if the target three-dimensional contour is the same as the original three-dimensional contour, the situation that the tool is damaged is not shown, otherwise, if the target three-dimensional contour is different from the original three-dimensional contour, the situation that the tool is damaged is shown; the names of all the parts of the target tool can be pre-stored in the blockchain system and used as original part names, for example, when the target tool is a nipper pliers, the names of all the parts of the target tool, namely the original part names comprise a sharp edge, a knife edge and a pliers handle, when the target tool is returned by the angelica, the names of all the parts of the target tool are obtained by identifying a target three-dimensional model through deep learning, a neural network and other methods, the names are used as target part names, if the target part names are in one-to-one correspondence with the original part names, the situation that the tool is damaged is indicated, otherwise, if the number of the target part names is smaller than the number of the original part names, the situation that the tool is damaged is indicated, for example, if the target part names comprise the knife edge and the pliers handle are identified, the sharp edge is indicated to be damaged compared with the original part names.
The electromagnetic wave capable of penetrating the target tool is used, so that a space point cloud containing each component part inside the target tool can be obtained, and as the space point cloud between adjacent components is sparse, a boundary line between the adjacent component parts can be formed at the sparse space point cloud, so that a three-dimensional model of each component part of the target tool is obtained, the three-dimensional model is taken as a target component three-dimensional model, an original three-dimensional model of each component part of the target tool is pre-stored in a blockchain system and taken as an original component three-dimensional model, and whether the component part is missing inside the target tool which is restored currently can be detected by comparing the target component three-dimensional model with the original component three-dimensional model.
In the embodiment, a space point cloud of a target tool is obtained through a user node, the space point cloud is uploaded to a blockchain system, the blockchain system generates a target three-dimensional model of the target tool according to the received space point cloud, a first abnormal alarm is sent to an administrator node under the condition that the target three-dimensional model is not matched with an original three-dimensional model of the target tool, and the administrator node generates a damage message aiming at the target tool under the condition that the first abnormal alarm is received; the method has the advantages that when a user returns the tool, the space point cloud of the tool can be obtained in real time, the current three-dimensional model of the tool is restored according to the space point cloud, the current three-dimensional model is compared with the original three-dimensional model of the tool which is stored in advance on the blockchain, and when the current three-dimensional model and the original three-dimensional model are not matched, an alarm is sent to an administrator node, so that the damage condition of the tool can be found in time, and then the administrator is informed of repairing the damaged tool in time, and the influence on the next normal use of the tool is avoided.
In one embodiment, the user node is provided with a depth camera, and the depth camera is used for collecting a space point cloud of the target tool.
The space point cloud can be three-dimensional coordinate information of each point on the surface of the target tool acquired by the depth camera.
In the specific implementation, a depth camera can be configured for the user node, and when the user returns the target tool, the target tool is shot in real time by using the depth camera, so that the user node obtains the current space point cloud of the target tool.
In this embodiment, by setting the depth camera at the user node, the depth camera is used for collecting the space point cloud of the target tool, so that the space point cloud of the target tool can be obtained in real time, the damage condition of the target tool is determined according to the space point cloud, and the recognition efficiency of the damage condition of the target tool is improved.
In one embodiment, the administrator node is further configured to obtain a tool identifier and tool information of the target tool, and perform uplink certification on the blockchain system by using the tool identifier and the tool information; the tool information contains an original three-dimensional model of the target tool.
Wherein the tool identification may be a unique identification code of the target tool.
Wherein the tool information may be, but is not limited to, the type of target tool, date of manufacture, and original three-dimensional model.
In a specific implementation, when a target tool is put in storage, the administrator node can generate a unique identification code for the target tool as a tool identification, can acquire information such as the type, the production date and the three-dimensional outline of the target tool as tool information, can correlate the tool identification with the tool information, uploads the tool information to the blockchain system, and creates an identity authentication record of the target tool on the blockchain system, wherein the identity authentication record can comprise the tool identification of the target tool, the tool information corresponding to the tool identification and the registration time.
In this embodiment, by acquiring the tool identifier and the tool information of the target tool, and performing the uplink certification on the blockchain system, the tool information of the target tool can be registered on the blockchain system, so as to avoid information tampering and improve the reliability of tool information and tool management.
In one embodiment, the user node is further configured to upload a first borrowing request for the target tool to the blockchain system, and the blockchain system searches for the target tool according to the received first borrowing request, and generates a borrowing record associated with the tool identifier of the target tool if the target tool is found; the borrowing record includes a borrowing status and a borrowing object of the target appliance.
The first borrowing request may be a request to borrow tools stored in a power plant warehouse.
The borrowing status may include, among other things, not borrowed, not returned, and returned.
The borrowing object may be a user borrowing the target tool.
In the specific implementation, when a user needs to borrow a target tool stored in a power plant warehouse, a first borrowing request can be generated at a user node, the user node uploads the first borrowing request to a blockchain system, when the blockchain system receives the first borrowing request, the tool identifier of the target tool can be searched in an identity authentication record, if the tool identifier of the target tool is searched, the borrowing record of the target tool can be generated, and the borrowing record is associated with the tool identifier of the target tool, otherwise, if the tool identifier of the target tool is not searched, since the target tool is known to be stored in the power plant warehouse, the identity authentication record can be judged to have errors, and an administrator can be informed to manually verify the identity authentication record.
In practical application, a user uses a code scanner to scan the identification code of a tool and trigger borrowing operation. The blockchain system verifies the identity of the user and checks whether the tool can be borrowed, if so, a borrowing record of the tool is created on the blockchain system, and the borrowing record comprises the tool identification code, the user ID, the borrowing time and the expected return time.
In this embodiment, the first borrowing request for the target tool is uploaded to the blockchain system, the blockchain system searches for the target tool according to the received first borrowing request, and when the target tool is found, the borrowing record associated with the tool identification of the target tool is generated, so that the borrowing record can be automatically generated when the user borrows the tool, and the tool management efficiency is improved.
In one embodiment, the user node is further configured to upload a first return request for the target tool to the blockchain system, and the blockchain system updates the borrowing status in the borrowing record from unreturned to returned according to the received first return request.
Wherein the first return request may be a return request for tools for which no other user is waiting to borrow.
In a specific implementation, after a user borrows a target tool stored in a power plant warehouse, the blockchain system may mark the borrowing status of the target tool in the borrowing record as unreturned, if the user wants to return the target tool, a first return request may be generated at a user node, the user node uploads the first return request to the blockchain system, and when the blockchain system receives the first return request, the blockchain system may mark the borrowing status of the target tool in the borrowing record as returned.
In practical application, a user uses the code scanner to scan the identification code of the tool and trigger the return operation. The blockchain system verifies the identity of the user and checks whether the tool has been borrowed, and if so, updates the borrowing record of the tool on the blockchain system, including filling in the actual return time and updating the borrowing status.
In this embodiment, the first return request for the target tool is uploaded to the blockchain system, and the blockchain system updates the borrowing state in the borrowing record from unreturned to returned according to the received first return request, so that the borrowing record can be automatically updated when the user returns the tool, and the tool management efficiency is improved.
In an embodiment, the user node is further configured to upload a second borrowing request for the target appliance to the blockchain system when the blockchain system does not find the target appliance, and update the borrowed object in the borrowing record if the blockchain system receives the second borrowing request and further receives a second return request for the target appliance uploaded by other user nodes.
Wherein the second borrowing request may be a borrowing request for a borrowed fixture.
Wherein the second return request may be a return request for a tool that the current user waits for borrowing.
In a specific implementation, if the target tool that the current user needs to borrow is already borrowed by other users, a second borrowing request can be generated at the user node, the user node uploads the second borrowing request to the blockchain system, the blockchain system can wait for the other users to return to the target tool when receiving the second returning request of the target tool uploaded by the other user node, and when the blockchain system receives the second returning request of the target tool uploaded by the other user node, the other users are indicated to return to the target tool, at this time, the borrowing state in the borrowing record can be not required to be updated, and the borrowing object in the borrowing record can be directly updated to the current user from the other users.
In this embodiment, the second borrowing request for the target tool is uploaded to the blockchain system when the blockchain system does not find the target tool, and if the blockchain system also receives the second return request for the target tool uploaded by other user nodes when receiving the second borrowing request, the borrowing object in the borrowing record is updated, so that when the user returns the tool, if other users wait to borrow the tool, the borrowing user is directly updated in the borrowing record, and the tool management efficiency is further improved.
In one embodiment, the borrowing record further includes a target return time of the target tool, and the blockchain system sends a second abnormal alarm to the administrator node when the borrowing state of the target tool is unreturned and the current time exceeds the target return time; and the manager node is used for generating an overdue return message aiming at the target tool under the condition that the second abnormal alarm is received.
The target return time may be an expected return time of the target tool.
The second abnormal alarm may be an alarm signal indicating that the target tool has not returned over time.
In a specific implementation, when a user borrows a target tool, a target return time of the target tool can be recorded in the borrowed record, the blockchain system can periodically check the borrowed record of the target tool, if the borrowed state of the target tool recorded in the borrowed record is identified as unreturned and the current time exceeds the target return time, a second abnormal alarm is generated and sent to an administrator node, and the administrator node can generate an overdue return message of the target tool on a display to inform the administrator that the borrowed time of the target tool exceeds the expected return time under the condition that the second abnormal alarm is received, and can also directly send a return reminding to the user node.
In this embodiment, when the borrowing state of the target tool is unreturned and the current time exceeds the target return time, a second abnormal alarm is sent to the manager node, and when the manager node receives the second abnormal alarm, the manager node generates an overdue return message for the target tool, so that the manager or the user can be timely notified to return the tool when the tool is unreturned and the tool is prevented from being unreturned.
In one embodiment, the tool information further includes a target maintenance time of the target tool; the blockchain system sends a timing maintenance notification to an administrator node when the current time matches the target maintenance time.
The target maintenance time may be a time for performing timing maintenance on the target tool.
In a specific implementation, the target maintenance time of the target tool can be set in tool information stored in the blockchain system, the blockchain system can search the borrowing state of the target tool in the borrowing record when the current time reaches the target maintenance time, if the borrowing state is not borrowed or returned, a timing maintenance notification is generated, the timing maintenance notification is sent to an administrator node, and if the borrowing state is not returned, the timing maintenance notification can be sent to a user node.
In this embodiment, by sending a timing maintenance notification to the administrator node when the current time matches the target maintenance time, the tool can be timing maintained, and normal use of the tool is ensured.
In one embodiment, the tool information further includes an authorized user corresponding to the target tool; and the user node is further used for acquiring an authorized user corresponding to the target tool from the blockchain system under the condition that the query request of the target user for the target tool is received, and displaying the borrowed record of the target tool if the target user is in the range of the authorized user.
The authorized user may be a user authorized to view tool information of the target tool and borrow the record.
Wherein the target user may be a user requesting to view tool information of the target tool and borrow the record.
In a specific implementation, all authorized users of the target tool associated with the tool identifier may be pre-stored in the blockchain system, when the target user wishes to view the borrowed record of the target tool, a query request may be input to the user node, and the user node obtains all authorized users of the target tool according to the received query request in the blockchain system and to the tool identifier of the target tool, if all authorized users of the target tool include the target user, the user node may display the borrowed record of the target tool on the display for the target user to view, otherwise, if all authorized users of the target tool do not include the target user, the user node may display the lack of viewing authority of the target user on the display and refuse to display the borrowed record of the target tool.
In this embodiment, under the condition that a query request of a target user for a target tool is received, an authorized user corresponding to the target tool is obtained from the blockchain system, and if the target user is within the range of the authorized user, the borrowed record of the target tool is displayed, so that the security of the borrowed record can be ensured.
In one embodiment, the administrator node and the user node are both provided with a code scanner, and the code scanner is used for scanning the identification code on the target tool to obtain the tool identifier of the target tool corresponding to the identification code.
In the specific implementation, both the manager node and the user node can be configured with a code scanner, and the code scanner can scan the identification code on the target tool, so that the manager node or the user node obtains the tool identification of the target tool, and further the management operation of the tool is performed according to the tool identification.
In this embodiment, by providing the code scanner at both the administrator node and the user node, the code scanner is configured to scan the identification code on the target tool to obtain the tool identifier of the target tool corresponding to the identification code, which can improve the efficiency of tool management.
In order to facilitate a thorough understanding of embodiments of the present application by those skilled in the art, the following description will be provided in connection with a specific example.
The application provides a power plant tool warehouse management system, which aims to improve safety management and tracking of tools. The specific management method comprises the following steps:
(1) And (5) authenticating and registering the identity of the tool. A unique identification code, such as a bar code or two-dimensional code, is generated for each tool. The tool identification code is associated with its detailed information (e.g., tool type, date of manufacture, etc.). An identity record of the fixture is created on the blockchain, including the fixture identification code, the detailed information, and the registration time.
(2) User identity authentication. The user logs into the system through a secure identity authentication mode (such as user name password and two-factor authentication). A user identity authentication record is created on the blockchain including the user ID, identity information and authentication time.
(3) Tool borrowing process. The user uses the scanning device to scan the identification code of the tool and trigger the borrowing operation. The system verifies the user identity and checks if the tool is borrowable. Tool borrowing records are created on the blockchain, including tool identification codes, user IDs, borrowing time, and projected return time.
(4) And (5) returning the tools and instruments. The user uses the scanning device to scan the identification code of the tool and trigger a return operation. The system verifies the user identity and checks if the tool has been borrowed. Tool borrowing records are updated on the blockchain, including actual return time and status.
(5) And (5) monitoring and inquiring in real time. A user can monitor the borrowing state and the history record of the tools in real time through the user terminal equipment. The data stored on the blockchain may be used to query the tool's use, borrow history, and return records in real time.
(6) Exception handling and alerting. The system monitors the borrowing and returning conditions of tools through intelligent contracts, and detects abnormal conditions to trigger an alarm. The alarm includes that the tool is not returned on time, the tool is borrowed for more than a prescribed time, and the like. The relevant alert information is recorded on the blockchain, ensuring transparency and auditability.
(7) Data privacy protection. The privacy protection technology in the blockchain is adopted, so that workers can only check the use records of tools and instruments related to the work of the workers. Sensitive information such as maintenance records, etc. may be set to be visible only to authorized personnel.
(8) Periodic auditing and maintenance. And auditing the tool use records on the blockchain regularly to ensure the consistency and the integrity of the data. The system may automatically trigger a maintenance request if the tool requires maintenance. By implementing the steps, the power plant tool management method based on the blockchain realizes safety tracking, real-time monitoring and transparent management of tools. The specific implementation of each step should be tailored to the specific needs of the system and the blockchain platform employed.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a tool management method for realizing the block chain system for tool management. The implementation of the solution to the problem provided by the method is similar to that described in the above system, so the specific limitations in one or more embodiments of the tool management method provided below may be referred to above as limitations of the blockchain system, and will not be described herein.
In one embodiment, as shown in fig. 2, there is provided a tool management method applied to a blockchain system, the method including:
step S210, receiving a space point cloud of a target tool uploaded by a user node;
step S220, generating a target three-dimensional model of the target tool according to the space point cloud;
step S230, a first abnormal alarm is sent to an administrator node under the condition that the target three-dimensional model is not matched with an original three-dimensional model of a target tool; the administrator node generates a damage message for the target tool upon receipt of the first anomaly alert.
In one embodiment, the user node is provided with a depth camera for acquiring a spatial point cloud of the target tool.
In one embodiment, the administrator node is further configured to obtain a tool identifier and tool information of the target tool, and perform uplink certification on the blockchain system on the tool identifier and the tool information; the tool information includes the original three-dimensional model of the target tool.
In one embodiment, the user node is further configured to upload a first borrowing request for the target appliance to the blockchain system, where the blockchain system searches for the target appliance according to the received first borrowing request, and generates a borrowing record associated with an appliance identification of the target appliance if the target appliance is found; the borrowing record includes a borrowing status and a borrowing object of the target fixture.
In one embodiment, the user node is further configured to upload a first return request for the target appliance to the blockchain system, and the blockchain system updates the borrowing status in the borrowing record from unreturned to returned according to the received first return request.
In one embodiment, the user node is further configured to upload a second borrowing request for the target tool to the blockchain system if the blockchain system does not find the target tool, and if the blockchain system receives the second borrowing request, update the borrowed object in the borrowing record if a second return request for the target tool uploaded by another user node is also received.
In one embodiment, the borrowing record further includes a target return time of the target tool, and the blockchain system sends a second exception alert to the administrator node if the borrowing status of the target tool is unreturned and the current time exceeds the target return time; the manager node is used for generating overdue return information aiming at the target tool under the condition that the second abnormal alarm is received.
In one embodiment, the tool information further includes a target maintenance time of the target tool; and the blockchain system sends a timing maintenance notification to the manager node under the condition that the current time is matched with the target maintenance time.
In one embodiment, the tool information further includes an authorized user corresponding to the target tool; the user node is further configured to obtain, from the blockchain system, an authorized user corresponding to the target tool when a query request of the target user for the target tool is received, and if the target user is within the range of the authorized user, display a borrowed record of the target tool.
In one embodiment, the administrator node and the user node are both provided with a code scanner, and the code scanner is used for scanning the identification code on the target tool to obtain the tool identifier of the target tool corresponding to the identification code.
Since the specific tool management process of the blockchain system is described in detail in the foregoing embodiments, it is not repeated here.
According to the tool management method, the space point cloud of the target tool is obtained through the user node, the space point cloud is uploaded to the blockchain system, the blockchain system generates a target three-dimensional model of the target tool according to the received space point cloud, a first abnormal alarm is sent to the manager node when the target three-dimensional model is not matched with an original three-dimensional model of the target tool, and a damage message aiming at the target tool is generated when the manager node receives the first abnormal alarm; the method has the advantages that when a user returns the tool, the space point cloud of the tool can be obtained in real time, the current three-dimensional model of the tool is restored according to the space point cloud, the current three-dimensional model is compared with the original three-dimensional model of the tool which is stored in advance on the blockchain, and when the current three-dimensional model and the original three-dimensional model are not matched, an alarm is sent to an administrator node, so that the damage condition of the tool can be found in time, and then the administrator is informed of repairing the damaged tool in time, and the influence on the next normal use of the tool is avoided.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 3. The computer device includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input means. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program, when executed by a processor, implements a tool management method. The display unit of the computer device is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device. The display screen can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 3 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In an embodiment, there is also provided a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the method embodiments described above when the computer program is executed.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, carries out the steps of the method embodiments described above.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data are required to comply with the related laws and regulations and standards of the related countries and regions.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as Static Random access memory (Static Random access memory AccessMemory, SRAM) or dynamic Random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples only represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (10)

1. A blockchain system for tool management, the blockchain system comprising a user node and an administrator node;
the user node is configured to obtain a spatial point cloud of a target tool, upload the spatial point cloud to a blockchain system, so that the blockchain system generates a target three-dimensional model of the target tool according to the received spatial point cloud, and send a first abnormal alarm to the administrator node when the target three-dimensional model is not matched with an original three-dimensional model of the target tool;
The manager node is configured to generate a damage message for the target tool when the first anomaly alert is received.
2. The system of claim 1, wherein the user node is provided with a depth camera for capturing a spatial point cloud of the target tool.
3. The system of claim 1, wherein the administrator node is further configured to obtain a fixture identification and fixture information for the target fixture, and to perform a chain-up certification of the fixture identification and fixture information on the blockchain system; the tool information includes the original three-dimensional model of the target tool.
4. The system of claim 3, wherein the user node is further configured to upload a first borrowing request for the target fixture to the blockchain system, the blockchain system to search for the target fixture based on the received first borrowing request, and to generate a borrowing record associated with a fixture identification of the target fixture if the target fixture is found; the borrowing record includes a borrowing status and a borrowing object of the target fixture.
5. The system of claim 4, wherein the user node is further configured to upload a first return request to the blockchain system for the target appliance, the blockchain system updating the borrowed status in the borrowed record from unreturned to returned based on the received first return request.
6. The system of claim 4, wherein the user node is further configured to upload a second borrowing request for the target appliance to the blockchain system if the target appliance is not found by the blockchain system, and wherein the blockchain system updates the borrowed object in the borrowing record if a second return request for the target appliance is also received, the second return request being uploaded by another user node if the second borrowing request is received.
7. The system of claim 4, wherein the borrowing record further comprises a target return time for the target fixture, the blockchain system sending a second exception alert to the manager node if the borrowed status of the target fixture is unreturned and the current time exceeds the target return time;
The manager node is used for generating overdue return information aiming at the target tool under the condition that the second abnormal alarm is received.
8. The system of claim 3, wherein the tool information further comprises a target maintenance time for the target tool; and the blockchain system sends a timing maintenance notification to the manager node under the condition that the current time is matched with the target maintenance time.
9. The system of claim 3, wherein the tool information further comprises an authorized user corresponding to the target tool; the user node is further configured to obtain, from the blockchain system, an authorized user corresponding to the target tool when a query request of the target user for the target tool is received, and if the target user is within the range of the authorized user, display a borrowed record of the target tool.
10. The system according to any one of claims 3 to 9, wherein the administrator node and the user node are each provided with a code scanner for scanning an identification code on the target tool to obtain a tool identification of the target tool corresponding to the identification code.
CN202311544399.5A 2023-11-20 2023-11-20 Blockchain system for tool management Pending CN117523367A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311544399.5A CN117523367A (en) 2023-11-20 2023-11-20 Blockchain system for tool management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311544399.5A CN117523367A (en) 2023-11-20 2023-11-20 Blockchain system for tool management

Publications (1)

Publication Number Publication Date
CN117523367A true CN117523367A (en) 2024-02-06

Family

ID=89750946

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311544399.5A Pending CN117523367A (en) 2023-11-20 2023-11-20 Blockchain system for tool management

Country Status (1)

Country Link
CN (1) CN117523367A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108280570A (en) * 2018-01-09 2018-07-13 国网山东省电力公司滨州供电公司 A kind of self-service management platform of managing security tools and instruments
CN110544042A (en) * 2019-09-06 2019-12-06 腾讯科技(深圳)有限公司 Book management method and device based on block chain network
CN111127744A (en) * 2019-12-25 2020-05-08 广东电科院能源技术有限责任公司 Electric power worker utensil management system
CN112659078A (en) * 2020-12-28 2021-04-16 杭州电力设备制造有限公司 Electric power worker utensil cabinet
CN113102269A (en) * 2021-04-07 2021-07-13 沈阳建筑大学 Prefabricated part finished product quality detection system based on three-dimensional stereoscopic vision and application thereof
CN113538122A (en) * 2021-07-22 2021-10-22 上海盛付通电子支付服务有限公司 Method, apparatus, medium, and program product for borrowing resources
CN215510957U (en) * 2021-02-22 2022-01-14 新疆丝路六合电气科技有限公司 Intelligent positioning safety tool cabinet for safety tool block chain
CN114117387A (en) * 2021-12-04 2022-03-01 中国南方电网有限责任公司超高压输电公司广州局 Substation tool monitoring method and device, computer equipment and storage medium
CN114707170A (en) * 2021-12-20 2022-07-05 重庆大学 Method and system for processing and monitoring 3D reconstruction data
WO2023081398A1 (en) * 2021-11-05 2023-05-11 Bired Imaging, Inc. Spatial and characteristic property data to detect a source in a system
CN116911789A (en) * 2023-07-20 2023-10-20 邹平县汇能热电有限公司 Borrowing monitoring management system suitable for tool and instrument use of manufacturing enterprises

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108280570A (en) * 2018-01-09 2018-07-13 国网山东省电力公司滨州供电公司 A kind of self-service management platform of managing security tools and instruments
CN110544042A (en) * 2019-09-06 2019-12-06 腾讯科技(深圳)有限公司 Book management method and device based on block chain network
CN111127744A (en) * 2019-12-25 2020-05-08 广东电科院能源技术有限责任公司 Electric power worker utensil management system
CN112659078A (en) * 2020-12-28 2021-04-16 杭州电力设备制造有限公司 Electric power worker utensil cabinet
CN215510957U (en) * 2021-02-22 2022-01-14 新疆丝路六合电气科技有限公司 Intelligent positioning safety tool cabinet for safety tool block chain
CN113102269A (en) * 2021-04-07 2021-07-13 沈阳建筑大学 Prefabricated part finished product quality detection system based on three-dimensional stereoscopic vision and application thereof
CN113538122A (en) * 2021-07-22 2021-10-22 上海盛付通电子支付服务有限公司 Method, apparatus, medium, and program product for borrowing resources
WO2023081398A1 (en) * 2021-11-05 2023-05-11 Bired Imaging, Inc. Spatial and characteristic property data to detect a source in a system
CN114117387A (en) * 2021-12-04 2022-03-01 中国南方电网有限责任公司超高压输电公司广州局 Substation tool monitoring method and device, computer equipment and storage medium
CN114707170A (en) * 2021-12-20 2022-07-05 重庆大学 Method and system for processing and monitoring 3D reconstruction data
CN116911789A (en) * 2023-07-20 2023-10-20 邹平县汇能热电有限公司 Borrowing monitoring management system suitable for tool and instrument use of manufacturing enterprises

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
QINGLIN YANG等: "Fusing Blockchain and AI With Metaverse: A Survey", 《IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY》, vol. 3, 4 July 2022 (2022-07-04), pages 122 - 136, XP011915302, DOI: 10.1109/OJCS.2022.3188249 *
侯峰等: "电力安全工器具智能管理系统的研发及应用", 《宁夏电力》, no. 02, 28 April 2020 (2020-04-28), pages 15 - 19 *
张乐平: "区块链时代的城市运营管理", 《智能城市》, vol. 6, no. 12, 28 June 2020 (2020-06-28), pages 22 - 23 *

Similar Documents

Publication Publication Date Title
US10810683B2 (en) Hierarchical meta-ledger transaction recording
CN110383274B (en) Method, device, system, storage medium, processor and terminal for identifying equipment
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN107943949B (en) Method and server for determining web crawler
CN111311176B (en) Vehicle maintenance auditing method and device, maintenance end equipment, server and medium
CN117291583B (en) Internet of things data management method and system
CN113688423A (en) Data management method, system and equipment of mobile vaccination vehicle
CN105069718B (en) Self-service monitoring method and system for smart homeland real estate based on mobile Internet of things
CN117523367A (en) Blockchain system for tool management
CN108846455A (en) A kind of method and terminal device of the protective relaying device maintenance based on two dimensional code
CN115756255A (en) Method, device and equipment for processing equipment parameters of parking lot equipment and storage medium
CN116257837B (en) Application system login method and device, computer equipment and storage medium
WO2022190433A1 (en) Information management system, information management method, and information management program
CN116366462A (en) Risk detection method, risk detection device, computer equipment and storage medium
CN117194561A (en) Block chain-based test data processing method and device and computer equipment
CN116248754A (en) Information pushing method, device, computer equipment and storage medium
CN116663907A (en) Method and device for generating early warning information, computer equipment and storage medium
CN117557280A (en) Communication product tracing method, device, equipment, medium and program product
CN117033452A (en) Database processing method, device, computer equipment and storage medium
CN115221990A (en) Method, system and device for determining state of tool and instrument and computer equipment
CN117557951A (en) Power grid abnormal event monitoring method, device, computer equipment and storage medium
CN115292559A (en) Article information processing method and device, computer equipment and storage medium
CN116757677A (en) Linkage processing method and device for abnormal power grid equipment and computer equipment
CN116880869A (en) System interface updating method, device, computer equipment and storage medium
CN117993923A (en) Agricultural product tracing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination