CN113947874A - Data processing method and device, electronic equipment and readable storage medium - Google Patents
Data processing method and device, electronic equipment and readable storage medium Download PDFInfo
- Publication number
- CN113947874A CN113947874A CN202111022147.7A CN202111022147A CN113947874A CN 113947874 A CN113947874 A CN 113947874A CN 202111022147 A CN202111022147 A CN 202111022147A CN 113947874 A CN113947874 A CN 113947874A
- Authority
- CN
- China
- Prior art keywords
- information
- label
- user
- tag
- verified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 14
- 238000000034 method Methods 0.000 claims abstract description 54
- 238000012545 processing Methods 0.000 claims abstract description 6
- 238000004590 computer program Methods 0.000 claims description 18
- 238000012795 verification Methods 0.000 claims description 15
- 238000012986 modification Methods 0.000 claims description 6
- 230000004048 modification Effects 0.000 claims description 6
- 238000012217 deletion Methods 0.000 claims description 3
- 230000037430 deletion Effects 0.000 claims description 3
- 241000283690 Bos taurus Species 0.000 description 10
- 238000007726 management method Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 238000004458 analytical method Methods 0.000 description 6
- 230000001360 synchronised effect Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/24—Reminder alarms, e.g. anti-loss alarms
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B7/00—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
- G08B7/06—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H40/00—ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
- G16H40/20—ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
Landscapes
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Emergency Management (AREA)
- Epidemiology (AREA)
- Biomedical Technology (AREA)
- Telephone Function (AREA)
Abstract
The application discloses a data processing method, a data processing device, an electronic device and a readable storage medium, wherein the method comprises the following steps: acquiring information to be verified of a user; inquiring whether label information corresponding to the information to be verified exists in a preset label library, if so, determining whether the label information meets preset alarm conditions, and if so, displaying the alarm information; if the label information does not exist or the label information does not accord with the preset alarm condition, the alarm information is not displayed so as to improve the alarm efficiency.
Description
Technical Field
The present application belongs to the field of computer technologies, and in particular, to a data processing method and apparatus, an electronic device, and a readable storage medium.
Background
At present, the medical problems in the civil problems are always the problems of special attention of people, and with the development of networks, various problems begin to appear in the field of vision of people. In order to avoid the uncontrollable tragedy caused by the nervous doctor-patient relationship, a key alarm is added in most hospitals at present, so that the risk is reduced as much as possible. However, the method cannot effectively and timely make the related personnel pay attention to the limited personnel, and the efficiency of the whole alarm process is low.
Disclosure of Invention
The embodiment of the application provides an implementation scheme different from the prior art so as to solve the technical problem that the alarm mode for limiting personnel is low in efficiency in the related technology.
In a first aspect, the present application provides a data processing method, including: acquiring information to be verified of a user; inquiring whether label information corresponding to the information to be verified exists in a preset label library, if so, determining whether the label information meets preset alarm conditions, and if so, displaying the alarm information; and if the label information does not exist or the label information does not accord with the preset alarm condition, the alarm information is not displayed.
In a second aspect, the present application provides a data processing apparatus comprising: the system comprises an acquisition module, a query module, a determination module and a display module; wherein: the acquisition module is used for acquiring information to be verified of a user; the query module is used for querying whether the label information corresponding to the information to be verified exists in a preset label library, if so, determining whether the label information meets a preset alarm condition through a determination module, and if so, displaying the alarm information through a display module; and if the label information does not exist or the label information does not accord with the preset alarm condition, the alarm information is not displayed.
In a third aspect, the present application provides an electronic device, comprising: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the data processing method of the first aspect or any of the possible implementations of the first aspect via execution of the executable instructions.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the data processing method described in the first aspect or any of the possible implementation manners of the first aspect.
In a fifth aspect, the present application provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the computer program implements the data processing method described in the first aspect or any of the possible implementation manners of the first aspect.
According to the data processing method, information to be verified of a user is acquired; inquiring whether label information corresponding to the information to be verified exists in a preset label library, if so, determining whether the label information meets preset alarm conditions, and if so, displaying the alarm information; if the label information does not exist or the label information does not accord with the preset alarm condition, the alarm information is not displayed, so that the identification efficiency of dangerous personnel can be improved, and the alarm information can be displayed so as to improve the corresponding alarm efficiency.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts. In the drawings:
fig. 1 is a schematic flow chart of a data processing method according to an exemplary embodiment of the present application;
fig. 2a is a schematic flowchart of a process of acquiring user information according to an embodiment of the present application;
fig. 2b is a schematic flowchart of a verification method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data processing apparatus according to an exemplary embodiment of the present application;
fig. 4 is a schematic block diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
The terms "first" and "second," and the like in the description, the claims, and the drawings of the embodiments of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of a data processing method according to an exemplary embodiment of the present application, where an execution subject of the method may be an alarm device disposed in a target area, and the method at least includes the following steps:
s1, acquiring the information to be verified of the user;
s2, inquiring whether label information corresponding to the information to be verified exists in a preset label library, if so, determining whether the label information meets preset alarm conditions, and if so, displaying the alarm information; and if the label information does not exist or the label information does not accord with the preset alarm condition, the alarm information is not displayed.
Specifically, in the step S1, the acquiring the to-be-authenticated information of the user includes:
the method comprises the steps of obtaining information to be verified input by a user on an information entry page, or obtaining information to be verified in a target area sent by a shooting device, or obtaining a travel code of the user, and determining the information to be verified according to the travel code.
Optionally, the obtaining of the to-be-verified information input by the user on the information entry page may include: the method comprises the steps of obtaining to-be-verified information input by a user on an information entry page of alarm equipment or receiving to-be-verified information sent by the user through corresponding terminal equipment, specifically, the user can enter the information entry page through searching a small program on the corresponding terminal equipment to complete user registration, and personal information is filled in the registration process, wherein the personal information can comprise at least part of information in user names, sexes, identity card numbers and the like, so that the to-be-verified information is determined according to the personal information, and the to-be-verified information can be the same as the personal information.
Further, the target area may be an area corresponding to a plurality of scenes, for example: a first preset area in a hospital, a bank, a school, etc. When the target area is the hospital entrance area, the user can complete user registration on the man-machine interaction device at the hospital door to complete filling of the information to be verified.
Further, the photographing device may be a photographing device in an area of a hospital entrance, and accordingly, the information to be verified may be face information of the user.
Secondly, the travel code can be a travel code received from a user mobile phone, and the information to be verified can be determined according to the received travel code, wherein the user can scan a travel two-dimensional code through the mobile phone to obtain the travel code of the user; here, the information to be authenticated may include personal information of the user.
In some optional embodiments of the present application, the information to be verified may also be identification information associated with personal information of the user, where the identification information may be a unique identifier assigned to the user by the terminal device when the user registers the related applet, and the unique identifier may be a registration account composed of numbers and letters. Correspondingly, the label pairs stored in the preset label library comprise the unique mark corresponding to the user and the label information corresponding to the unique mark.
Further, in the step S2, the querying whether the tag information corresponding to the information to be verified exists in the preset tag library includes the following steps:
s21, acquiring a label pair set in a label library;
s22, whether a target label pair matched with the information to be verified exists or not is inquired from the label pair set, and if yes, the label information corresponding to the information to be verified exists in the label library.
Specifically, the aforementioned tag pair set may include a plurality of tag pairs, and each tag pair may store tag information corresponding to user information. The label pair, the user information and the label information correspond to each other one by one.
Inquiring whether a target label pair matched with the information to be verified exists from the label pair set comprises the following steps:
matching the information to be verified with a plurality of pieces of user information in the tag pair set, if the target user information consistent with the information to be verified is matched in the plurality of pieces of user information, indicating that the tag pair set has a target tag pair matched with the information to be verified, and if the target user information is not matched with the information to be verified, indicating that the tag pair set does not have the target tag pair matched with the information to be verified. When the information to be verified is the same as the target user information, the information to be verified and the target user information can be regarded as consistent.
For example: when the information to be verified is the identity card number of the user, and the identity card number is consistent with the identity card number in a certain label pair in the label library, determining that the label pair is a target label pair matched with the information to be verified, namely, the target label pair matched with the information to be verified exists in the label pair set.
Further, in the foregoing step S2, the determining whether the tag information meets the preset alarm condition includes:
and if the label information indicates that the user is a restricted user, determining that the label information meets a preset alarm condition, wherein the restricted user is a person who restricts access.
Specifically, after determining a target tag pair in the tag library according to the acquired information to be verified, the tag information of the target tag pair is also required to be analyzed to determine whether the user is a restricted user, where the restricted user may be a cattle or a troubled man. And when the user is the limited user, determining that the label information meets the preset alarm condition. The label information may be text information or other identification information, which is not limited in this application.
In some optional embodiments of the present application, after displaying the warning information, the method further includes: determining management equipment corresponding to the alarm information; and sending the alarm information to the management equipment so that the management equipment displays the corresponding prompt information.
Specifically, the alarm information may include information to be verified, and a corresponding alarm identifier (e.g., exclamation mark); the management device may be a monitor of the target area, or may be a terminal device used by the relevant person, and further, the prompt message may be an alarm sound emitted by a buzzer to remind the staff to take corresponding measures.
Further, the method further comprises:
acquiring update information aiming at a tag library;
updating the tag library based on update information, the update information including any one or more of: the tag pair modification information includes tag pair deletion information for a set of tag pairs, tag pair extension information for a set of tag pairs, and tag pair modification information for a set of tag pairs.
In some optional embodiments of the present application, when it is detected that the applet is not logged in by the user corresponding to the first tag pair within the first preset time period, in order to save the storage space, the first tag pair is deleted to update the tag library information.
In other optional embodiments of the present application, if the corresponding tag information indicates that the user is a cattle, and the registration times and the visit times of the user are consistent within a second preset time period, the second tag pair corresponding to the tag information is deleted.
Further, modification information of the related person for the third tag pair can be received to update the tag library.
Further, in some embodiments of the present application, the method further comprises the steps of:
s101, acquiring reporting information;
s102, whether the tag information corresponding to the report information exists in the tag library or not is determined, and if not, the report information is sent to verification equipment so that the verification equipment can determine the update information according to the report information.
For example: the method comprises the steps that a user can report that a suspicious user is a cattle or a medical alarm person to a relevant department of a hospital, at the moment, staff of the hospital logs in a relevant system by using administrator authority to determine whether label information corresponding to the user is the cattle or the medical alarm, if not, the reported information is directly sent to verification equipment, or information to be verified of the suspicious user is determined according to the reported information, the information to be verified is sent to the verification equipment, label libraries corresponding to other hospitals are stored on the verification equipment, the verification equipment can determine whether the suspicious user is a limited user according to the label libraries corresponding to the other hospitals and the information to be verified of the suspicious user, and if yes, update information of a mark pair corresponding to the suspicious user is generated according to a determination result to expand the update information.
In other optional embodiments, the determining, by the verification device, the update information according to the report information may further specifically include: and acquiring an updating instruction aiming at the reported information, and determining the updating information by using the updating instruction, wherein the updating instruction can be determined according to the operation of related personnel.
According to the data processing method, information to be verified of a user is acquired; inquiring whether label information corresponding to the information to be verified exists in a preset label library, if so, determining whether the label information meets preset alarm conditions, and if so, displaying the alarm information; if the label information does not exist or the label information does not accord with the preset alarm condition, the alarm information is not displayed, so that the identification efficiency of dangerous personnel can be improved, and the alarm information can be displayed so as to improve the corresponding alarm efficiency.
The scheme is further explained by combining a specific scene, and the labels of the cattle and the medical alarm can be realized by two methods of manual marking and automatic marking; wherein:
the method for artificially marking the 'cattle' label is as follows:
(1) and the staff of the registration department manually marks the marks through a human-computer interaction interface. Specifically, when the staff of the registration department identifies that the user is a cattle or a medical alarm, the corresponding label of the user can be manually marked through the staff management system.
(2) The patient reports actively, the patient informs relevant departments of the hospital of the cattle information, and staff in the hospital marks reported users correspondingly through the authority of an administrator.
The method for automatically labeling the "cattle" label is as follows:
the analysis device marks the label of the user by analyzing the data of the user, such as the registration times and the visit times of the user, and when the registration times of the user is greater than the preset visit times, for example, the difference between the registration times and the visit times of the user exceeds 20 times, the system automatically marks the user as a 'cattle'.
The method for automatically marking the medical alarm label comprises the following steps:
when the current user is detected to be medically troubled through the shooting equipment of the hospital, for example, when the user makes dangerous actions on a target object (a doctor) or quarries with the target object, the face information of the user can be acquired and the user can be marked as medically troubled.
The user information contained in the label pair corresponding to the user is the face information corresponding to the user, and the corresponding label information can be 'medical alarm'.
Furthermore, the shooting device can also upload the acquired image to be analyzed in the second preset area to the analysis device, so that the analysis device can analyze the image to be analyzed, determine whether a medical alarm exists in the image to be analyzed, and determine the face information corresponding to the medical alarm when the medical alarm exists. Specifically, the analysis device analyzes the image to be analyzed, determines whether a result of medical alarm exists in the image to be analyzed, and when the image to be analyzed has medical alarm and face information corresponding to the medical alarm, the image to be analyzed can be used as a reference of a preset analysis model, the preset analysis model is executed, the result of whether medical alarm exists in the image to be analyzed is obtained, and when the image to be analyzed has medical alarm, the face information corresponding to the medical alarm is obtained.
Further, the process of acquiring the user information can be shown in fig. 2a, and may include the following steps:
the user enters into the small program to carry out personal information registration;
real-name verification, and filling identity information;
and recording the user information recorded by the equipment after the registration is successful, wherein the recording equipment can be the alarm equipment or another equipment different from the alarm equipment. After recording user information recorded by the equipment, sending the user information to alarm equipment, so that the alarm equipment inquires whether the label information corresponding to the information to be verified exists in a preset label library after acquiring verification information of a user, if so, determining whether the label information meets preset alarm conditions, and if so, displaying the alarm information; and if the label information does not exist or the label information does not accord with the preset alarm condition, the alarm information is not displayed.
Further, the data processing method may be further applicable to a server device, and when the method is applicable to the server device, displaying the alarm information may include: and sending the alarm information to alarm equipment to enable the alarm equipment to display the alarm information. In some optional embodiments of the application, when the user goes to the hospital, the warning device may scan the preset code through the user at the gate of the hospital, obtain the information to be verified of the user, and send the information to the server device; accordingly, the verification process can be seen in fig. 2b, which can include the following steps:
a user enters a door and scans code registration;
the user fills in the flow adjustment information and reports the flow adjustment information to the server-side equipment;
the server-side equipment performs personnel comparison through label search through a platform personnel label system;
and determining whether the current user belongs to the limited user according to the comparison result, if the comparison result shows that the current user belongs to the limited user, generating alarm information, and sending the alarm information to alarm equipment, and if the comparison result shows that the current user does not belong to the limited user, not generating the alarm information, so that the user can see a doctor normally.
Fig. 3 is a schematic structural diagram of a data processing apparatus according to an exemplary embodiment of the present application; wherein, the device includes: the method comprises the following steps:
an acquisition module 31, a query module 32, a determination module 33 and a presentation module 34; wherein:
the acquiring module 31 is configured to acquire information to be verified of a user;
the query module 32 is configured to query whether the tag information corresponding to the information to be verified exists in a preset tag library, if so, determine whether the tag information meets a preset alarm condition through the determination module 33, and if so, display the alarm information through the display module 34;
and if the label information does not exist or the label information does not accord with the preset alarm condition, the alarm information is not displayed.
Optionally, the obtaining module 31 is specifically configured to, when being configured to obtain to-be-verified information of a user: the method comprises the steps of obtaining information to be verified input by a user on an information entry page, or obtaining information to be verified in a target area sent by a shooting device, or obtaining a travel code of the user, and determining the information to be verified according to the travel code.
Optionally, the query module 32 is configured to query whether the tag information corresponding to the information to be verified exists in a preset tag library, and specifically configured to: acquiring a label pair set in a label library; and inquiring whether a target label pair matched with the information to be verified exists or not from the label pair set, and if so, determining that the label information corresponding to the information to be verified exists in the label library.
Optionally, the determining module 33 is configured to, when determining whether the tag information meets a preset alarm condition, specifically: and when the label information indicates that the user is a restricted user, determining that the label information meets a preset alarm condition, and restricting the user from being a person who restricts access.
Optionally, the apparatus is further configured to: determining management equipment corresponding to the alarm information; and sending the alarm information to the management equipment so that the management equipment displays corresponding prompt information.
Optionally, the apparatus is further configured to: acquiring update information aiming at a tag library; updating the tag library based on update information, the update information including any one or more of: the tag pair modification information includes tag pair deletion information for a set of tag pairs, tag pair extension information for a set of tag pairs, and tag pair modification information for a set of tag pairs.
Optionally, the apparatus is further configured to: acquiring reporting information; and determining whether the tag information corresponding to the report information exists in the tag library, and if not, sending the report information to the verification equipment so that the verification equipment determines the update information according to the report information.
It is to be understood that apparatus embodiments and method embodiments may correspond to one another and that similar descriptions may refer to method embodiments. To avoid repetition, further description is omitted here. Specifically, the apparatus may perform the method embodiment, and the foregoing and other operations and/or functions of each module in the apparatus are respectively corresponding flows in each method in the method embodiment, and for brevity, are not described again here.
The apparatus of the embodiments of the present application is described above in connection with the drawings from the perspective of functional modules. It should be understood that the functional modules may be implemented by hardware, by instructions in software, or by a combination of hardware and software modules. Specifically, the steps of the method embodiments in the present application may be implemented by integrated logic circuits of hardware in a processor and/or instructions in the form of software, and the steps of the method disclosed in conjunction with the embodiments in the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. Alternatively, the software modules may be located in random access memory, flash memory, read only memory, programmable read only memory, electrically erasable programmable memory, registers, and the like, as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps in the above method embodiments in combination with hardware thereof.
Fig. 4 is a schematic block diagram of an electronic device provided in an embodiment of the present application, where the electronic device may include:
a memory 401 and a processor 402, the memory 401 being adapted to store a computer program and to transfer the program code to the processor 402. In other words, the processor 402 may call and run a computer program from the memory 401 to implement the method in the embodiment of the present application.
For example, the processor 402 may be adapted to perform the above-described method embodiments according to instructions in the computer program.
In some embodiments of the present application, the processor 402 may include, but is not limited to:
general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like.
In some embodiments of the present application, the memory 401 includes, but is not limited to:
volatile memory and/or non-volatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (DDR SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DR RAM).
In some embodiments of the present application, the computer program may be partitioned into one or more modules, which are stored in the memory 401 and executed by the processor 402 to perform the methods provided herein. The one or more modules may be a series of computer program instruction segments capable of performing certain functions, the instruction segments describing the execution of the computer program in the electronic device.
As shown in fig. 4, the electronic device may further include:
a transceiver 403, the transceiver 403 being connectable to the processor 402 or the memory 401.
The processor 402 may control the transceiver 403 to communicate with other devices, and specifically, may transmit information or data to the other devices or receive information or data transmitted by the other devices. The transceiver 403 may include a transmitter and a receiver. The transceiver 403 may further include antennas, and the number of antennas may be one or more.
It should be understood that the various components in the electronic device are connected by a bus system that includes a power bus, a control bus, and a status signal bus in addition to a data bus.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a computer, enables the computer to perform the method of the above-described method embodiments. In other words, the present application also provides a computer program product containing instructions, which when executed by a computer, cause the computer to execute the method of the above method embodiments.
When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application occur, in whole or in part, when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a Digital Video Disk (DVD)), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
Those of ordinary skill in the art will appreciate that the various illustrative modules and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the module is merely a logical division, and other divisions may be realized in practice, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. For example, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
1. A data processing method, comprising:
acquiring information to be verified of a user;
inquiring whether label information corresponding to the information to be verified exists in a preset label library, if so, determining whether the label information meets preset alarm conditions, and if so, displaying the alarm information;
and if the label information does not exist or the label information does not accord with the preset alarm condition, the alarm information is not displayed.
2. The method of claim 1, wherein obtaining information to be authenticated for a user comprises: the method comprises the steps of obtaining information to be verified input by a user on an information entry page, or obtaining information to be verified in a target area sent by a shooting device, or obtaining a travel code of the user, and determining the information to be verified according to the travel code.
3. The method according to claim 1, wherein querying whether the tag information corresponding to the information to be verified exists in a preset tag library comprises:
acquiring a label pair set in the label library;
and inquiring whether a target label pair matched with the information to be verified exists or not from the label pair set, and if so, determining that the label information corresponding to the information to be verified exists in the label library.
4. The method of claim 1, wherein determining whether the tag information meets a preset alarm condition comprises:
and if the label information indicates that the user is a restricted user, determining that the label information meets a preset alarm condition, wherein the restricted user is a person who restricts access.
5. The method of claim 1, further comprising:
determining management equipment corresponding to the alarm information;
and sending the alarm information to the management equipment so that the management equipment displays corresponding prompt information.
6. The method of claim 3, further comprising:
acquiring update information for the tag library;
updating the tag library based on the update information, the update information including any one or more of: tag pair deletion information for the set of tag pairs, tag pair expansion information for the set of tag pairs, and tag pair modification information for the set of tag pairs.
7. The method of claim 6, further comprising:
acquiring reporting information;
and determining whether the tag information corresponding to the report information exists in the tag library, and if not, sending the report information to verification equipment so that the verification equipment determines the update information according to the report information.
8. A data processing apparatus, comprising: the system comprises an acquisition module, a query module, a determination module and a display module; wherein:
the acquisition module is used for acquiring information to be verified of a user;
the query module is used for querying whether the label information corresponding to the information to be verified exists in a preset label library, if so, the determination module is used for determining whether the label information meets a preset alarm condition, and if so, the display module is used for displaying the alarm information;
and if the label information does not exist or the label information does not accord with the preset alarm condition, the alarm information is not displayed.
9. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of any of claims 1-7 via execution of the executable instructions.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111022147.7A CN113947874A (en) | 2021-09-01 | 2021-09-01 | Data processing method and device, electronic equipment and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111022147.7A CN113947874A (en) | 2021-09-01 | 2021-09-01 | Data processing method and device, electronic equipment and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113947874A true CN113947874A (en) | 2022-01-18 |
Family
ID=79327615
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111022147.7A Pending CN113947874A (en) | 2021-09-01 | 2021-09-01 | Data processing method and device, electronic equipment and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113947874A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114880339A (en) * | 2022-05-30 | 2022-08-09 | 中移(杭州)信息技术有限公司 | Data processing method, device, terminal device and storage medium |
CN116821523A (en) * | 2023-08-30 | 2023-09-29 | 山西合力思创科技股份有限公司 | Personnel matching logic verification method and device, electronic equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101546195A (en) * | 2009-05-20 | 2009-09-30 | 乔超 | Ticket service system and method for preventing scalping train tickets |
CN107147621A (en) * | 2017-04-20 | 2017-09-08 | 微医集团(浙江)有限公司 | The implementation method of internet medical treatment ox risk control |
CN110164536A (en) * | 2019-05-31 | 2019-08-23 | 侯尧珍 | A kind of whole process intelligent medical system for distribution of out-patient department |
CN110363080A (en) * | 2019-06-05 | 2019-10-22 | 平安科技(深圳)有限公司 | Ox recognition methods, device, terminal and storage medium based on recognition of face |
CN110795587A (en) * | 2018-08-01 | 2020-02-14 | 深圳云天励飞技术有限公司 | Medical alarm early warning method, service platform and computer readable storage medium |
CN111541867A (en) * | 2020-03-18 | 2020-08-14 | 北京中科医信科技有限公司 | Face recognition system suitable for medical institution and working method thereof |
CN111598162A (en) * | 2020-05-14 | 2020-08-28 | 万达信息股份有限公司 | A cattle risk monitoring method, terminal device and storage medium |
CN113221725A (en) * | 2021-05-08 | 2021-08-06 | 上海智蕙林医疗科技有限公司 | Risk processing method and system |
-
2021
- 2021-09-01 CN CN202111022147.7A patent/CN113947874A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101546195A (en) * | 2009-05-20 | 2009-09-30 | 乔超 | Ticket service system and method for preventing scalping train tickets |
CN107147621A (en) * | 2017-04-20 | 2017-09-08 | 微医集团(浙江)有限公司 | The implementation method of internet medical treatment ox risk control |
CN110795587A (en) * | 2018-08-01 | 2020-02-14 | 深圳云天励飞技术有限公司 | Medical alarm early warning method, service platform and computer readable storage medium |
CN110164536A (en) * | 2019-05-31 | 2019-08-23 | 侯尧珍 | A kind of whole process intelligent medical system for distribution of out-patient department |
CN110363080A (en) * | 2019-06-05 | 2019-10-22 | 平安科技(深圳)有限公司 | Ox recognition methods, device, terminal and storage medium based on recognition of face |
CN111541867A (en) * | 2020-03-18 | 2020-08-14 | 北京中科医信科技有限公司 | Face recognition system suitable for medical institution and working method thereof |
CN111598162A (en) * | 2020-05-14 | 2020-08-28 | 万达信息股份有限公司 | A cattle risk monitoring method, terminal device and storage medium |
CN113221725A (en) * | 2021-05-08 | 2021-08-06 | 上海智蕙林医疗科技有限公司 | Risk processing method and system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114880339A (en) * | 2022-05-30 | 2022-08-09 | 中移(杭州)信息技术有限公司 | Data processing method, device, terminal device and storage medium |
CN116821523A (en) * | 2023-08-30 | 2023-09-29 | 山西合力思创科技股份有限公司 | Personnel matching logic verification method and device, electronic equipment and storage medium |
CN116821523B (en) * | 2023-08-30 | 2023-11-24 | 山西合力思创科技股份有限公司 | Personnel matching logic verification method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104584621B (en) | Outside the wireless mixing field for reconnecting the time for reducing computing device/scene prediction calculating | |
US20130175334A1 (en) | System, computer program and method for managing medical information | |
WO2016207844A1 (en) | System for capturing and transmitting livestock data | |
JP2012018457A (en) | Signage display information providing apparatus, signage display information providing method, and signage display information providing program | |
CN103581441B (en) | Mobile terminal follows the trail of burglary-resisting system and method | |
US8577394B2 (en) | Security management system and method | |
CN113947874A (en) | Data processing method and device, electronic equipment and readable storage medium | |
CN109345661B (en) | Campus type Bluetooth unlocking method | |
CN111709055A (en) | User information acquisition method and device, electronic equipment and storage medium | |
US20200058206A1 (en) | Auto-learning generation and use of objects checklist based on proximity control | |
US9626810B2 (en) | Method for providing telematics service | |
CN109951473B (en) | Function triggering method, system, electronic device and computer readable storage medium | |
KR20100051154A (en) | System for managing of the hospitalization of patient and apparatus for display of the inpatient information | |
CN111627543A (en) | Hospital intelligent management system based on WeChat public account | |
CN109544380B (en) | Method for settling claims based on location service and related products | |
CN111901299A (en) | Application authentication method and device, electronic equipment and storage medium | |
KR101245984B1 (en) | Apparatus and method for managing resource using mobile | |
US20090254369A1 (en) | System and method for providing health care services using smart health cards | |
CN109474591A (en) | Account's sharing method, device, electronic equipment and storage medium between multisystem | |
CN114333098A (en) | Patrol method, patrol device, electronic equipment and computer readable medium | |
CN115687826A (en) | Page refreshing method and device, computer equipment and storage medium | |
CN112199113A (en) | Software service access control method and device | |
KR20220066215A (en) | Visit history registration method using smartphone | |
KR101079663B1 (en) | Visiting management system and visit management method for the saddle place using mobile terminal | |
CN107633180B (en) | Data query method and system of public security system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220118 |
|
RJ01 | Rejection of invention patent application after publication |