Equipment supervision method and system based on identity verification

An identity verification and supervision system technology, applied in the field of equipment supervision based on identity verification, can solve problems such as high cost, property loss, and loopholes in supervision, and achieve the effect of ensuring legal compliance.

Pending Publication Date: 2021-08-06
NINGBO POLYTECHNIC
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Environmental monitoring departments or third-party organizations with relevant qualifications often need to send qualified engineers and technicians to designated locations to collect environmental samples for on-site analysis or bring them back to the laboratory for analysis, but some technicians will take advantage of regulatory loopholes to take samples nearby Analyzing or entrusting unqualified personnel to take samples and other operations that do not comply with professional regulations
In addition, the equipment used for sampling and testing is expensive, and there are cases where some technicians privately lend them to unrelated personnel, resulting in equipment damage or property loss. Therefore, a management method is urgently needed to supervise these behaviors and constraints

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment supervision method and system based on identity verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] In order to better rectify the irregular operation of existing high-value equipment when going out to work, and avoid equipment damage caused by private borrowing and borrowing, such as figure 1 As shown, the present invention proposes a method for equipment supervision based on identity verification, including steps:

[0035] S1: Send a task order to the designated employee terminal, the task order includes task information, task location information, and employee identity information bound to the designated employee terminal;

[0036] S2: Obtain the unique identity certificate uploaded by the management terminal for the first identity verification. If the verification is successful, send the warehouse-out instruction to the management terminal, and the management terminal will send the equipment to the employee terminal according to the warehouse-out instruction;

[0037] S3: After the completion of the acquisition task, the identity verification information and locat...

Embodiment 2

[0051]In order to better explain the technical content of the present invention, this embodiment illustrates the present invention in the form of a system structure, a device supervision system based on identity verification, including:

[0052] The server is configured to generate a task order and send it to a designated employee terminal, where the task order includes task information, task location information, and employee identity information bound to the designated employee terminal;

[0053] The management terminal is used to upload the employee's unique identity certificate to the server for the first identity verification, and send the equipment to the employee's end when the verification is successful and the outbound order is obtained;

[0054] The employee side is used to upload the identity verification information and location information to the server for the second identity verification after the task is completed, and return the equipment.

[0055] Further, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an equipment supervision method and system based on identity verification, and relates to the field of equipment management, and the method specifically comprises the steps: sending a task list to a designated employee terminal; obtaining the unique identity certificate of the employee uploaded by the management end for first-time identity verification, and if verification succeeds, sending a warehouse-out instruction to the management end, and enabling the management end to issue the equipment to the employee end according to the warehouse-out instruction; obtaining identity verification information and positioning information uploaded by the employee terminal after the task is completed, and carrying out secondary identity verification; and receiving an equipment warehousing signal after successful verification. According to the invention, the task list is distributed to the designated employee terminal, the management terminal carries out the unique identity verification and the identity verification of the employee, and carries out the identity verification of the employee before the equipment is delivered out of the warehouse and after the task is completed. Through triple identity confirmation, the equipment is ensured to be lended to specified qualified technicians in the whole lending process.

Description

technical field [0001] The invention relates to the field of equipment management, in particular to an identity verification-based equipment supervision method and system. Background technique [0002] Environmental monitoring departments or third-party organizations with relevant qualifications often need to send qualified engineers and technicians to designated locations to collect environmental samples for on-site analysis or bring them back to the laboratory for analysis, but some technicians will take advantage of regulatory loopholes to take samples nearby Analyzing or entrusting unqualified personnel to take samples and other operations that do not comply with professional regulations. In addition, the equipment used for sampling and testing is expensive, and there are cases where some technicians privately lend them to unrelated personnel, resulting in equipment damage or property loss. Therefore, a management method is urgently needed to supervise these behaviors a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/08G06F21/32
CPCG06Q10/087G06F21/32
Inventor 姜浩
Owner NINGBO POLYTECHNIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products