CN118228756A - FOD prevention management method and system for detection tool - Google Patents

FOD prevention management method and system for detection tool Download PDF

Info

Publication number
CN118228756A
CN118228756A CN202410643254.9A CN202410643254A CN118228756A CN 118228756 A CN118228756 A CN 118228756A CN 202410643254 A CN202410643254 A CN 202410643254A CN 118228756 A CN118228756 A CN 118228756A
Authority
CN
China
Prior art keywords
detection tool
rfid
rfid tag
tool box
unique
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410643254.9A
Other languages
Chinese (zh)
Inventor
屠水丰
李晓
徐加祥
俞杭达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Xiaoshan International Airport Co ltd
Original Assignee
Hangzhou Xiaoshan International Airport Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Xiaoshan International Airport Co ltd filed Critical Hangzhou Xiaoshan International Airport Co ltd
Priority to CN202410643254.9A priority Critical patent/CN118228756A/en
Publication of CN118228756A publication Critical patent/CN118228756A/en
Pending legal-status Critical Current

Links

Landscapes

  • Burglar Alarm Systems (AREA)

Abstract

The invention provides an anti-FOD management method and system of a detection tool, wherein the method comprises the following steps: configuring an RFID tag for each detection tool, configuring a detection tool box, and configuring a first RFID reader for the detection tool box; constructing a unique identification set of RFID tags of the detection tool, and reading all RFID tag signals in the range of the detection tool box by the first RFID reader and identifying the unique identifications of all RFID tags; comparing the unique identifiers of all RFID tags identified in the range of the detection tool kit with the unique identifier set, and judging the RFID tags missing in the range of the current detection tool kit; and transmitting the unique identification of the missing RFID tag to an upper computer, wherein the upper computer transmits the unique identification of the missing RFID tag to all second RFID readers preset in a scene range, and the second RFID readers recognize and position the missing RFID tag.

Description

FOD prevention management method and system for detection tool
Technical Field
The invention relates to the technical field of detection, in particular to an anti-FOD management method and system of a detection tool.
Background
At present, FOD is one of the important hidden hazards of scene safety such as airport aviation, high-speed railway and the like, wherein an aircraft is quite fragile for foreign matters, a plastic film is sucked into an engine to cause air stop, metal objects such as hard coins and nuts can damage blades of the aircraft engine even, aviation accidents occur, screws, metal tools, metal sheets or sharp stones can puncture tires of the aircraft to cause tire burst, and generated tire fragments can puncture the aircraft body or important parts such as hydraulic pipes, oil tanks and the like.
The FOD sources of the airport at present mainly are the problems of loss of related equipment, ageing of equipment and part or part structure falling caused by faults, wherein detection tools are required to detect and maintain due to the ageing and faults of the related equipment, however, the number of the detection tools is large, the detection tools possibly become airport FOD due to loss of loss or parts, and the FOD prevention management and control of the detection tools in the prior art is in a manual management and control mode, and the manual management and control mode is time-consuming and labor-consuming, so that a certain degree of negligence exists, and particularly the problem that the tools are lost easily under the severe environment of night or snow conditions is caused, so that a certain degree of FOD risk is caused.
Disclosure of Invention
One of the objects of the present invention is to provide a method and a system for FOD prevention management of detection tools, where an RFID tag is attached to each detection tool, the RFID tag is identified by an RFID reader in a detection tool box, whether the detection tool is put into the box is determined by combining RFID tag information stored in advance in the detection tool and an identification signal of the RFID reader, and the method determines whether the detection tool is missing according to the RFID tag information identified by the RFID reader, and sends out alarm information according to the missing condition of the tool, thereby effectively preventing the detection tool from being missing to generate FOD risk, and improving safety of detection scenes.
Another object of the present invention is to provide a method and a system for preventing FOD management of a detection tool, where a rights management policy is provided for use of the detection tool, and a fingerprint module is configured on a detection tool box corresponding to the detection tool, and the fingerprint module is used to identify a detection tool box that can be opened only by a authorized user or a manager, so as to improve a strict management effect of the detection tool box, and avoid possible FOD risks caused by opening by unrelated people.
The invention further aims to provide an FOD (field emission display) management method and system for detection tools, wherein the method and system locate detection signals of RFID labels corresponding to each detection tool, when the detection tools are lost, the detection tools are quickly searched by sending RFID label information of the lost detection tools to an upper computer, and all fixed readers in a scene are started to detect surrounding RFID label signals, and when the RFID label information of the lost detection tools exists in the detected label signals, the RFID labels of the lost detection tools are located.
The invention further aims to provide an anti-FOD management method and system for the detection tool, and the method and system can effectively reduce the problem of loss of the detection tool in the night or severe environment by utilizing the RFID tag information security alarm of the detection tool and the RFID tag positioning mode in the scene, and reduce the scene FOD risk caused by loss of the detection tool through intelligent management.
In order to achieve at least one of the above objects, the present invention further provides an FOD prevention management method of a inspection tool, the method comprising:
Configuring an RFID tag for each detection tool, and configuring a detection tool box, wherein the detection tool box is provided with a first RFID reader;
The method comprises the steps of pre-inputting and storing necessary unique identifications of RFID tags of each detection tool, constructing a unique identification set of the RFID tags of the detection tools, reading all RFID tag signals in the range of a detection tool box by a first RFID reader, and identifying the unique identifications of all RFID tags;
Comparing the unique identifiers of all RFID tags identified in the range of the detection tool kit with the unique identifier set, and judging the RFID tags missing in the range of the current detection tool kit;
And transmitting the unique identification of the missing RFID tag to an upper computer, wherein the upper computer transmits the unique identification of the missing RFID tag to all second RFID readers preset in a scene range, and the second RFID readers recognize and position the missing RFID tag.
According to one preferred embodiment of the present invention, the method for identifying the RFID tag of the detection tool in the detection tool box comprises: acquiring the state of a current detection tool box, if the current detection tool box is in an open state, the first RFID reader does not read RFID tag signals any more, and when the detection tool box is in a closed state, the first RFID reader reads all RFID tag signals in the detection tool box range and compares the unique identifications of all the read RFID tag signals in the detection tool box range with the unique identification set, wherein the detection tool box is made of signal isolation materials, and when the detection tool box is closed, external RFID tag signals are isolated.
According to another preferred embodiment of the present invention, the detection kit includes a fingerprint module for detecting the identified fingerprint authority, wherein the fingerprint authority includes an administrator authority, a usage authority and a no authority, and the unique identification of the RFID tag is entered into a storage method including: the fingerprint module of the detection tool box identifies fingerprint data, judges fingerprint authority, and when the authority of the identified fingerprint data is administrator authority, identifies and records and stores the unique identifier of each RFID tag in the detection tool box under the closing state of the detection tool box through the first RFID reader according to the unique identifier recording function selected by the administrator authority.
According to another preferred embodiment of the present invention, when the fingerprint data identified by the fingerprint module is the user right, the detection tool box automatically unlocks the detection tool box according to the user right; and when the fingerprint data identified by the fingerprint module is unauthorized, the detection tool box does not unlock the detection tool box any more according to the unauthorized.
According to another preferred embodiment of the present invention, the missing RFID tag identification method includes: when the detection tool box is in a locked state, the first RFID reader is controlled to read the unique RFID tag identification in the detection tool box, and the first RFID reader is controlled to read the unique RFID tag identification in the detection tool box, compare and match the unique RFID tag identification with the identification set, and screen out the unique RFID tag identification which is not matched as the unique RFID tag identification which is missing.
According to another preferred embodiment of the present invention, the detection tool box is configured with an alarm module, the alarm module is connected with a processing module of the detection tool box, when the unique RFID tag identifier of the RFID tag in the detection tool box read by the first RFID reader has a missing unique RFID tag identifier, the processing module sends an alarm instruction to the alarm module, and the alarm module sends alarm information to the outside according to the alarm instruction.
According to another preferred embodiment of the present invention, the upper computer pre-constructs a coordinate system in a scene, pre-obtains coordinate positions of all fixedly configured second RFID readers in the scene, and uploads the unique identification of the missing RFID tag to the upper computer, and then the upper computer issues the unique identification of the missing RFID tag to all configured second RFID readers, and the second RFID readers read RFID tag signals within their own detection ranges, and if the second RFID readers detect and identify the unique identification of the missing RFID tag, the second RFID readers are marked as target second RFID readers.
According to another preferred embodiment of the present invention, coordinate positions of at least 3 target second RFID readers in the coordinate system in the scene are obtained, a distance from each target second RFID reader to the unique identifier of the missing RFID tag is calculated, each second RFID reader is used as a center, a detection distance from the corresponding second RFID reader to the unique identifier of the missing RFID tag is used as a side length, a detection circle is constructed in the coordinate system in the scene, coordinate positions of intersection points of at least 3 detection circles in the coordinate system are calculated, and the coordinate positions of the intersection points are uploaded to the upper computer for positioning query.
In order to achieve at least one of the above objects, the present invention further provides an anti-FOD management system of a inspection tool, which performs the above anti-FOD management method of an inspection tool.
The present invention further provides a computer-readable storage medium storing a computer program that is executed by a processor to implement the FOD prevention management method of one of the above-described detection tools.
Drawings
FIG. 1 is a flow chart of an anti-FOD management method of a detection tool according to the present invention.
Fig. 2 is a schematic diagram of a structure for detecting a closed state of a tool box in the present invention.
Fig. 3 is a schematic diagram showing the open state structure of the detection tool box in the invention.
FIG. 4 is a schematic diagram showing the connection of the modules of the anti-FOD management system of the inspection tool according to the present invention.
FIG. 5 is a schematic diagram showing unique identification positioning of a missing RFID tag in a scene according to the present invention.
The device comprises a detection tool box-1, a display module-2, a fingerprint module-3, an electromagnetic lock-4, a detection tool-5, an RFID reader-6 and an RFID tag-7.
Detailed Description
The following description is presented to enable one of ordinary skill in the art to make and use the invention. The preferred embodiments in the following description are by way of example only and other obvious variations will occur to those skilled in the art. The basic principles of the invention defined in the following description may be applied to other embodiments, variations, modifications, equivalents, and other technical solutions without departing from the spirit and scope of the invention.
It will be understood that the terms "a" and "an" should be interpreted as referring to "at least one" or "one or more," i.e., in one embodiment, the number of elements may be one, while in another embodiment, the number of elements may be plural, and the term "a" should not be interpreted as limiting the number.
Referring to fig. 1-5, the invention discloses a method and a system for preventing FOD management of a detection tool, wherein the system mainly comprises the following parts: the RFID tag detection system comprises a detection tool box, detection tools, RFID tags, an RFID reader, an upper computer and the like, wherein each detection tool is configured to be attached with the RFID tag, and the RFID tag has a unique identifier. The RFID reader is configured in the detection kit and is used for identifying signals of different RFID tags in the detection kit, and it should be noted that the RFID tag is preferably an active tag in the present invention. The detection tool box is provided with a processing module, a display module, a communication module and a fingerprint module, wherein the fingerprint module and the display module are connected with the processing module, the processing module is connected with the communication module, communication connection is established through the communication module and the upper computer, the RFID reader is connected with the processing module, the RFID reader can input the unique identification into the processing module after recognizing the unique identification of the signal of the RFID tag in the detection tool box for relevant input, matching comparison and other processing operations, and the unique identification of the RFID tag existing in the detection tool box and the unique identification set of the pre-input RFID tag are matched and compared through the RFID reader so as to judge whether the unique identification of the missing RFID tag exists or not, thereby judging whether the detection tool is lost or not in the current detection tool box. The invention also constructs a scene coordinate system, RFID readers are configured in the scene coordinate system, after communication connection is established between the RFID readers configured in the scene and the upper computer, interaction between the detection tool box and the RFID readers configured in the scene can be realized, wherein the RFID readers in the scene can be arranged at fixed intervals, for example, the RFID readers can be arranged at two sides of an airport runway at intervals of 10 meters. The RFID reader fixedly installed in the scene can detect the RFID tag corresponding to the lost detection tool. Therefore, intelligent strict supervision of the detection tool is realized, and FOD risks caused by the lost detection tool left in a scene are avoided.
It should be noted that, referring to fig. 2-3, the outer skin of the detection tool box in the present invention may be composed of signal isolation materials including, but not limited to, aluminum, copper, and alloy, so that the tool box may isolate RFID tag signals outside the detection tool box in a closed state, thereby implementing accurate detection of RFID tag signals inside the detection tool box, avoiding the influence of RFID tag signals outside the detection tool box, having embedded blocks of different detection tools inside the detection tool box, so that each detection tool may be accurately and fixedly placed inside the detection tool box, and between the embedded blocks may be composed of soft materials such as foam, so that each detection tool may avoid being damaged by impact inside the detection tool box. The surface of the detection tool box is provided with the display module and the fingerprint module, wherein the display module is used for visually displaying the current state in the tool box and displaying the selection of functions such as detection, login, input, alarm and the like, and the fingerprint module is in communication connection with the processing module and is used for inputting relevant fingerprint data. The tool box is provided with an electromagnetic lock, and the electromagnetic lock is connected with the processing module of the detection tool box.
Specifically, the detection tool box realizes strict supervision on the detection tool through the fingerprint module and the processing module, the fingerprint module identifies fingerprint data, and the processing module judges fingerprint data authority, wherein the supervision method comprises the following steps: fingerprint data is input in the detection tool box in advance, wherein rights are given to the fingerprint data input in advance, and the rights of the fingerprint data comprise manager rights and user rights. The processor presets a functional permission range of the administrator permission, for example, the administrator permission may be preconfigured with functional permissions including, but not limited to, fingerprint entry, password modification, tag entry, and the like. And the user right may configure only the unlocking right of the detection kit. When the fingerprint data is not identified as the administrator fingerprint or the user fingerprint after fingerprint comparison and matching, the current fingerprint data is unauthorized, and the detection tool box does not execute any functional operation. Therefore, the fingerprint data acquisition and processing module of the fingerprint module can effectively monitor the use flow of the detection tool in the detection tool box by utilizing the authority identification of the fingerprint data, and avoid FOD risk in a scene caused by the fact that irrelevant personnel open the detection tool box.
The method for inputting the RFID tag of the detection tool comprises the following steps: defining an RFID reader configured in the first detection tool box as a first RFID reader, when the detection tool box recognizes that the current operator is an administrator through passwords or fingerprint data, displaying a function of the corresponding authority of the administrator on the display module, selecting an RFID tag input function at the moment, and enabling the detection tool box to be in a waiting state. And after the RFID tag of the detection tool to be recorded is placed at the corresponding position in the detection tool box, closing the detection tool box. When the processing module of the detection tool box recognizes that the current detection tool box is in a closed state, the detection tool box recognizes a new RFID tag, the first RFID reader reads the unique identifier of the new RFID tag, and as the detection tool box is wrapped by a signal isolation material, the first RFID reader can only read the RFID tag signal in the detection tool box and store the unique identifier of the new RFID tag into the detection tool box. Of course, in another preferred embodiment of the present invention, the unique identifier of the RFID tag may be used in a manner including, but not limited to, two-dimensional code scanning or manual input, which is not described in detail herein.
The detection tool box realizes different functions in different states, wherein the detection of the RFID tag signal in the detection tool box is realized only when the detection tool box is in a closed state. In one preferred embodiment of the present invention, the detection of the switch state of the detection kit may be accomplished using a sensor including, but not limited to, a pressure sensor or the like. In another preferred embodiment of the present invention, the processing module of the detection tool box acquires the status signal of the electromagnetic lock in real time, wherein the status of the electromagnetic lock is sent to the processing module of the detection tool box through conversion into a digital signal, when the electromagnetic lock is in a locked state, the locked state is converted into a digital signal 1, and if the electromagnetic lock is in an unlocked state, the unlocked state is converted into a digital signal 0. When the processing module of the detection tool recognizes that the digital signal is 1, the first RFID reader is started to read an RFID tag signal in the range of the detection tool box; and if the processing module of the detection tool recognizes that the digital signal is 0, the first RFID reader is not started to read the signal.
Further, since the actual operation scene may have night operation or operation under a severe environment, the problem of FOD risk caused by loss of the detection tool is very easily caused. Therefore, in order to enhance the management effect on the detection tool, the detection judgment is performed according to the loss condition of the detection tool, when the detection tool box is unlocked and opened through the fingerprint data of the user authority or the manager authority identified by the fingerprint module, a user or a manager can use the detection tool, when the detection tool is used completely, the user or the manager is required to put the detection tool back to the original position, and recovery supervision of the detection tool can be completed only when all the detection tools exist in the detection tool box. The specific method comprises the following steps: and the detection tool which is currently finished in detection operation is placed at the corresponding position of the detection tool box, the detection tool box is closed, when the detection tool box is in a locking state, a locked digital signal 1 is generated, the locked digital signal 1 is sent to a processing module of the detection tool box, after the locked digital signal 1 is received, the detection tool box processing module drives a first RFID reader in the detection tool box to read RFID tag signals in the detection tool box, after unique identifiers of all RFID tag signals in the detection tool box after locking are identified and acquired, the unique identifiers of all RFID tag signals which are identified and acquired are compared and matched with a unique identifier set stored in a system in advance, and if the unique identifiers of all RFID tag signals in the detection tool box which is currently identified are matched with the unique identifiers of each RFID tag signal in the unique identifier set one by one, the detection tool in the detection tool box is judged to be recovered and not lost. The detection tool box does not send an alarm instruction to the alarm device any more.
When all the obtained unique identifications of the RFID tag signals are identified and matched with a unique identification set stored in the system in a comparing mode, and the unique identifications of the RFID tag signals in at least one unique identification set are not matched, judging that detection tools are lost through a processing module in the detection tool box, obtaining the unique identifications corresponding to the lost RFID tag signals and the corresponding lost detection tool names, and carrying out visual display on the lost detection tool names and the unique identifications corresponding to the RFID tags. Further, when the detection tool box processing module recognizes that the missing RFID tag unique identification exists. Automatically generating a first alarm instruction, and sending the first alarm instruction to alarm equipment such as a pre-configured buzzer, an alarm indicator lamp and the like. So that an operator can quickly and accurately know the problem of the loss of the detection tool.
In another preferred embodiment of the present invention, if the unique identifier of all the RFID tag signals detected in the closed state in the detection tool box is compared with the unique identifier set after the detection tool box is opened and used under the use permission condition, and there is a unique identifier of the RFID tag signal outside the unique identifier set, the processing module generates a second alarm instruction, and sends the second alarm instruction to alarm devices such as a preconfigured buzzer and an alarm indicator lamp. The first alarm instruction and the second alarm instruction may be set in different alarm modes, which will not be described in detail in the present invention. The second alarm instruction is used for prompting that the detection tool in the detection tool box is misplaced during recovery, and the possible reason is that a plurality of detection maintenance personnel are used in a crossed mode when using the detection tool, so that errors occur during recovery of the detection tool. It should be noted that, in the present invention, the first alarm instruction and the second alarm instruction may occur simultaneously, that is, the detection tool that has a missing detection tool and a redundant recovery error exist in the current detection tool box at the same time.
Further, according to the invention, the first RFID reader recognizes that the unique identifier of the missing RFID tag signal exists in the detection tool box, the processing module of the detection tool box sends the unique identifier of the missing RFID tag signal to the upper computer through the communication module, the upper computer sends the unique identifier of the missing RFID tag signal to all the second RFID readers in the scene, and the second RFID readers in the scene further position the unique identifier of the missing RFID tag signal in the scene after acquiring the unique identifier of the missing RFID tag signal. The positioning method mainly comprises the following steps: firstly, acquiring unique identifiers of all detected RFID tag signals in a reading detection range of each second RFID reader in a scene, and if the unique identifiers of the missing RFID tag signals are detected, automatically marking the second RFID readers as target second RFID readers by an upper computer. Because the second RFID reader is arranged at a fixed position, the coordinate information of the second RFID reader can be directly acquired when a scene coordinate system is established. Therefore, after the upper computer marks and determines the target second RFID readers, the upper computer can acquire at least 3 coordinate positions :P1=(x1,y1)、P2=(x2,y2)、P3=(x3,y3)..... of the target second RFID readers, and at the moment, a three-point positioning method is adopted to position the unique identification F of the missing RFID tag signal.
It should be noted that, for example, please refer to a schematic diagram of unique identification positioning of a missing RFID tag in the scene shown in fig. 5, the three-point positioning method of the present invention specifically includes the following steps: after coordinate positions P1=(x1,y1)、P2=(x2,y2)、P3=(x3,y3) of the 3 target second RFID readers are obtained, signal strength RSSI of unique identifiers of the 3 target second RFID readers to the missing RFID tag signals is obtained and is b 1,b2 and b 3 respectively, and a distance between each target second RFID reader and the unique identifier of the missing RFID tag signal is calculated according to the signal strength, wherein a mode of calculating a wireless communication distance by using the signal strength RSSI is a prior art, and the calculation process is not described in detail. The distances between the obtained 3 target second RFID readers and the unique identifications of the missing RFID tag signals are r 1、r2 and r 3 respectively, the corresponding target second RFID reader coordinate values P 1=(x1,y1)、P2=(x2,y2) and P 3=(x3,y3) are taken as the original points, the corresponding distances r 1、r2 and r 3 are taken as the radiuses, 3 detection circles are drawn in the scene map, and corresponding detection circle functions (x-x12+(y-y1)2=r1 2、(x-x22+(y-y2)2=r2 2 and (x-x 32+(y-y3)2=r3 2) are generated. Further calculating coordinates of intersection points P s=(xs,ys of the 3 detection circle functions in a scene coordinate system, wherein the coordinates of the intersection points P s=(xs,ys) are positioning coordinates uniquely identifying the missing RFID tag signals.
After the positioning of the coordinates of the intersection point P s=(xs,ys) is completed, the lost detection tool can be quickly positioned. It should be noted that the three-point positioning method is only illustrative, and in other possible preferred embodiments of the present invention, the three-point positioning method may be used, including but not limited to triangulation, and the present invention will not be described in detail.
The processes described above with reference to flowcharts may be implemented as computer software programs in accordance with the disclosed embodiments of the application. Embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via a communication portion, and/or installed from a removable medium. The above-described functions defined in the method of the present application are performed when the computer program is executed by a Central Processing Unit (CPU). The computer readable medium of the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the above. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wire segments, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It will be understood by those skilled in the art that the embodiments of the present invention described above and shown in the drawings are merely illustrative and not restrictive of the current invention, and that this invention has been shown and described with respect to the functional and structural principles thereof, without departing from such principles, and that any modifications or adaptations of the embodiments of the invention may be possible and practical.

Claims (10)

1. A method for FOD prevention management of a detection tool, the method comprising:
Configuring an RFID tag for each detection tool, and configuring a detection tool box, wherein the detection tool box is provided with a first RFID reader;
The method comprises the steps of pre-inputting and storing necessary unique identifications of RFID tags of each detection tool, constructing a unique identification set of the RFID tags of the detection tools, and enabling a first RFID reader to read all RFID tag signals within the range of a detection tool box and identify the unique identifications of all RFID tags;
Comparing the unique identifiers of all RFID tags identified in the range of the detection tool kit with the unique identifier set, and judging the unique identifiers of the RFID tags missing in the range of the current detection tool kit;
And transmitting the unique identification of the missing RFID tag to an upper computer, wherein the upper computer transmits the unique identification of the missing RFID tag to all second RFID readers preset in a scene range, and the second RFID readers recognize and position the missing RFID tag.
2. The FOD prevention management method of a detection tool according to claim 1, wherein the identification method of the RFID tag of the detection tool within the detection tool box comprises: acquiring the state of a current detection tool box, if the current detection tool box is in an open state, the first RFID reader does not read RFID tag signals any more, and when the detection tool box is in a closed state, the first RFID reader reads all RFID tag signals in the detection tool box range and compares the unique identifications of all the read RFID tag signals in the detection tool box range with the unique identification set, wherein the detection tool box is made of signal isolation materials, and when the detection tool box is closed, external RFID tag signals are isolated.
3. The FOD prevention management method of a detection tool according to claim 1, wherein the detection tool box is a fingerprint module for detecting identified fingerprint rights, wherein the fingerprint rights include administrator rights, usage rights and no rights, and wherein the unique identification entry storage method of the RFID tag includes: the fingerprint module of the detection tool box identifies fingerprint data, judges fingerprint authority, and when the authority of the identified fingerprint data is administrator authority, identifies and records and stores the unique identifier of each RFID tag in the detection tool box under the closing state of the detection tool box through the first RFID reader according to the unique identifier recording function selected by the administrator authority.
4. The FOD prevention management method of a detection tool according to claim 3, wherein when the fingerprint data identified by the fingerprint module is a user right, the detection tool box automatically unlocks the detection tool box according to the user right; and when the fingerprint data identified by the fingerprint module is unauthorized, the detection tool box does not unlock the detection tool box any more according to the unauthorized.
5. The FOD prevention management method of a detection tool according to claim 1, wherein the identification method of the missing RFID tag unique identification comprises: when the detection tool box is in a locked state, the first RFID reader is controlled to read the unique RFID tag identification in the detection tool box, and the first RFID reader is controlled to read the unique RFID tag identification in the detection tool box, compare and match the unique RFID tag identification with the identification set, and screen out the unique RFID tag identification which is not matched as the unique RFID tag identification which is missing.
6. The FOD prevention management method of a detection tool according to claim 5, wherein the detection tool box is configured with an alarm module, the alarm module is connected with a processing module of the detection tool box, when the unique RFID tag identifier of the RFID tag in the detection tool box read by the first RFID reader has a missing unique RFID tag identifier, the processing module sends an alarm instruction to the alarm module, and the alarm module sends alarm information outwards according to the alarm instruction.
7. The FOD prevention management method of a detection tool according to claim 1, wherein the upper computer pre-constructs a coordinate system in a scene, pre-obtains coordinate positions of all fixedly configured second RFID readers in the scene, and after uploading the unique identification of the missing RFID tag to the upper computer, the upper computer issues the unique identification of the missing RFID tag to all configured second RFID readers, the second RFID readers read RFID tag signals within their own detection range, and if the second RFID readers detect and identify the unique identification of the missing RFID tag, the second RFID readers are marked as target second RFID readers.
8. The FOD prevention management method of a detection tool according to claim 7, wherein coordinate positions of at least 3 target second RFID readers in the coordinate system of the scene are obtained, a distance from each target second RFID reader to the unique identifier of the missing RFID tag is calculated, each second RFID reader is used as a center, a detection distance from the corresponding second RFID reader to the unique identifier of the missing RFID tag is used as a side length, a detection circle is constructed in the coordinate system of the scene, coordinate positions of intersection points of at least 3 detection circles in the coordinate system are calculated, and the coordinate positions of the intersection points are uploaded to the upper computer for positioning query.
9. An anti-FOD management system for a detection tool, characterized in that the system performs the anti-FOD management method for a detection tool according to any one of the above claims 1 to 8.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program that is executed by a processor to implement the FOD prevention management method of any one of the above-mentioned detection tools of claims 1-8.
CN202410643254.9A 2024-05-23 2024-05-23 FOD prevention management method and system for detection tool Pending CN118228756A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410643254.9A CN118228756A (en) 2024-05-23 2024-05-23 FOD prevention management method and system for detection tool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410643254.9A CN118228756A (en) 2024-05-23 2024-05-23 FOD prevention management method and system for detection tool

Publications (1)

Publication Number Publication Date
CN118228756A true CN118228756A (en) 2024-06-21

Family

ID=91502915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410643254.9A Pending CN118228756A (en) 2024-05-23 2024-05-23 FOD prevention management method and system for detection tool

Country Status (1)

Country Link
CN (1) CN118228756A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2451957A (en) * 2007-08-16 2009-02-18 Robert Davidson Tool box with integrated inventory control system
CN104181502A (en) * 2014-07-30 2014-12-03 北京航空航天大学 Indoor reference positioning method based on RFID technology
US20180060621A1 (en) * 2014-12-19 2018-03-01 Stanley Middle East FZE Container with a detection system
CN110238806A (en) * 2012-06-12 2019-09-17 实耐宝公司 Make to be communicated by network between inventory control system and remote system
CN110291547A (en) * 2017-02-13 2019-09-27 实耐宝公司 The automation tools data automated in the asset management system generate
US20200047326A1 (en) * 2018-08-10 2020-02-13 Alexandru Barbayanni System method and apparatus for foreign object damage (fod) prevention
EP3862946A1 (en) * 2020-02-05 2021-08-11 Trigo Qualitaire Method and system for protecting an area for aeronautical assembly or maintenance against fod
CN114358698A (en) * 2022-01-17 2022-04-15 北京安达维尔智能技术有限公司 Intelligent tool room control system
CN116008907A (en) * 2022-09-08 2023-04-25 枫演(珠海)科技有限公司 Radio frequency identification tag positioning system, method, device and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2451957A (en) * 2007-08-16 2009-02-18 Robert Davidson Tool box with integrated inventory control system
CN110238806A (en) * 2012-06-12 2019-09-17 实耐宝公司 Make to be communicated by network between inventory control system and remote system
CN104181502A (en) * 2014-07-30 2014-12-03 北京航空航天大学 Indoor reference positioning method based on RFID technology
US20180060621A1 (en) * 2014-12-19 2018-03-01 Stanley Middle East FZE Container with a detection system
CN110291547A (en) * 2017-02-13 2019-09-27 实耐宝公司 The automation tools data automated in the asset management system generate
US20200047326A1 (en) * 2018-08-10 2020-02-13 Alexandru Barbayanni System method and apparatus for foreign object damage (fod) prevention
EP3862946A1 (en) * 2020-02-05 2021-08-11 Trigo Qualitaire Method and system for protecting an area for aeronautical assembly or maintenance against fod
CN114358698A (en) * 2022-01-17 2022-04-15 北京安达维尔智能技术有限公司 Intelligent tool room control system
CN116008907A (en) * 2022-09-08 2023-04-25 枫演(珠海)科技有限公司 Radio frequency identification tag positioning system, method, device and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张皓等: "《现代机电控制工程》", 31 July 2022, 北京:机械工业出版社, pages: 248 - 251 *
李璇;: "维修工具的远程控制", 航空维修与工程, no. 03, 31 March 2015 (2015-03-31), pages 29 - 31 *

Similar Documents

Publication Publication Date Title
CN103390255B (en) A kind of building site digital management system and its application process
CN111492361B (en) System and method for side channel based network attack detection
CN107679591A (en) Construction site workmen's real-time location method based on safety
US20210056497A1 (en) Cargo detection and tracking
CN105741165A (en) Unmanned aerial vehicle renting system and method
CN103544757A (en) Door access control method
CN108765621B (en) Safety inspection system and inspection method for movable operation and maintenance of civil air defense door
CN105872065A (en) Real-time monitoring method and device and monitoring cloud platform
CN104794604B (en) A kind of full materials measurement management system
JP5463875B2 (en) Aircraft position measurement system, response signal discrimination method and response signal discrimination program used in the system
CN104809607B (en) A kind of logistics O&M Optimal Management System
CN111255278A (en) Intelligent induction parking device, method and system, vehicle and server
CN105539869A (en) Unmanned aerial vehicle maintenance and management system and method
CN114067615A (en) Intelligent security system based on Internet of things
CN105785959A (en) Near field communication-based modern chemical plant equipment management method
CN115719099A (en) Power equipment safety management and control system and method based on label digitization
KR101134454B1 (en) System for preventing disaster of construction in the field
CN118228756A (en) FOD prevention management method and system for detection tool
CN103177524A (en) In-place state real-time monitoring device and method of monitored objects
CN110348545A (en) A kind of AR Intelligent switching order method and device based on ERP system
CN106529514B (en) Unmanned aerial vehicle interference method, system and device based on infrared thermal imaging
CN104699048A (en) System and method for monitoring airplane fixtures
CN104269061A (en) Yellow label car detection and management system and detection and management method based on network
JP6093596B2 (en) Moving object monitoring system
US11822999B2 (en) Controlled zone tracking system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination