Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control method, device and equipment and storage medium

A task and temporary technology, applied in the direction of instruments, data processing applications, office automation, etc., can solve the problems of cumbersome application process, suspect escape, low efficiency, etc., and achieve the effect of improving deployment control efficiency and rapid deployment

Active Publication Date: 2020-04-21
云粒智慧科技有限公司
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, the application process for the above deployment and control tasks is cumbersome and inefficient, especially for emergency temporary deployment and control tasks, it is easy to miss the best time for deployment and control, resulting in the occurrence of suspects escaping and failing to catch suspects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method, device and equipment and storage medium
  • Control method, device and equipment and storage medium
  • Control method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] figure 1 It is a flow chart of a deployment and control method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation of temporary deployment and control by the public security department. The method may be executed by a control device, which may be implemented by software and / or hardware, and which may be configured on an electronic device such as a computer. Such as figure 1 As shown, the method specifically includes the following steps:

[0033] S110. When a temporary deployment and control instruction is detected, obtain associated information of a currently logged-in user of the deployment and control system.

[0034] Exemplarily, the temporary arming instruction may be an instruction corresponding to the function of the module generated by triggering a certain module. For example, refer to figure 2 The page diagram of a control system is shown, taking setting a temporary control task as an example, when it is necessa...

Embodiment 2

[0049] image 3 It is a flow chart of a deployment and control method provided by Embodiment 2 of the present invention. Embodiment 2 of the present invention is based on the above-mentioned embodiment and further refines the above-mentioned embodiment, as shown in image 3 As shown, the method specifically includes the following steps:

[0050] S210. When a temporary deployment and control instruction is detected, obtain associated information of a currently logged-in user of the deployment and control system.

[0051] S220. Based on the name of the currently logged-in user and the number of times the current logged-in user performs temporary deployment, generate a deployment name field according to a set data format.

[0052] The format of the set data can be in the form of "name + police officer's temporary deployment + number of times". refer to Figure 4 A schematic diagram of a temporary deployment page is shown, in which the deployment name field is "Officer Zhang Sa...

Embodiment 3

[0071] Figure 5 The flow chart of a deployment and control method provided by the third embodiment of the present invention, the third embodiment of the present invention is based on the above-mentioned embodiment, and further refines the above-mentioned embodiment, as shown in Figure 5 As shown, the method specifically includes the following steps:

[0072] S310. When a temporary deployment instruction is detected, obtain associated information of a currently logged-in user of the deployment and control system.

[0073] S311. Based on the name of the currently logged-in user and the number of times the current logged-in user performs temporary deployment, generate a deployment name field according to the set data format.

[0074] S312. Determine the jurisdictional area of ​​the currently logged-in user as the deployment and control range field.

[0075] S313. Determine the current login time as the start time field.

[0076] S314. Determine the time after the set duratio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a deploying and controlling method and device, equipment and a storage medium. The method comprises the steps that when a temporary deploying and controllinginstruction is detected, associated information of a current login user of a deploying and controlling system is acquired; generating a temporary deploying and controlling task according to a set rulebased on the associated information; receiving deploying and controlling task approver information and deploying and controlling target information; and submitting the temporary deploying and controlling task, the deploying and controlling task approver information and the deploying and controlling target information to enable the deploying and controlling task approver to approve the deploying and controlling task. By means of the technical scheme, quick deploying and controlling of the temporary deploying and controlling tasks are achieved, and deploying and controlling efficiency is improved.

Description

technical field [0001] Embodiments of the present invention relate to security deployment and control technologies, and in particular to a deployment and control method, device, equipment, and storage medium. Background technique [0002] Now when the public security department encounters a suspect, it needs to monitor the suspect and arrest the suspect in time. Before monitoring the suspects, the person in charge of the monitoring needs to apply for the monitoring task in the public security monitoring system, and the monitoring task can only be carried out after the application for the monitoring task is approved. Therefore, a convenient monitoring system is very important for the public security department. [0003] The current control task application process is as follows: First, the person in charge of control needs to fill in the specific control task in the control system, such as control name, control behavior, control start time, control end time, and control area....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10G06Q50/26
CPCG06Q10/103G06Q50/26
Inventor 杜晓雷卢海友马文博
Owner 云粒智慧科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products