[go: up one dir, main page]

CN114033261B - Anti-theft method, device and equipment for rectifier and storage medium - Google Patents

Anti-theft method, device and equipment for rectifier and storage medium Download PDF

Info

Publication number
CN114033261B
CN114033261B CN202111382637.8A CN202111382637A CN114033261B CN 114033261 B CN114033261 B CN 114033261B CN 202111382637 A CN202111382637 A CN 202111382637A CN 114033261 B CN114033261 B CN 114033261B
Authority
CN
China
Prior art keywords
rectifier
unlocking
verification code
condition
insertion frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111382637.8A
Other languages
Chinese (zh)
Other versions
CN114033261A (en
Inventor
陈东旭
窦笠
吴晓梅
郭松峰
王旭
冯迪
齐宏亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Tower Co Ltd
Original Assignee
China Tower Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Tower Co Ltd filed Critical China Tower Co Ltd
Priority to CN202111382637.8A priority Critical patent/CN114033261B/en
Publication of CN114033261A publication Critical patent/CN114033261A/en
Application granted granted Critical
Publication of CN114033261B publication Critical patent/CN114033261B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B51/00Operating or controlling locks or other fastening devices by other non-mechanical means
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B63/00Locks or fastenings with special structural characteristics
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B65/00Locks or fastenings for special use
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Structural Engineering (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a method and a device for preventing a rectifier from being stolen, electronic equipment and a storage medium, and relates to the technical field of rectifier management. The specific implementation scheme is as follows: the rectifier acquires a locking state; the rectifier judges whether the locking state meets a preset condition or not; when the locking state fails to meet the preset condition, the rectifier judges whether an unlocking condition is met; when the rectifier fails to meet the unlocking condition, the rectifier is adjusted to an abnormal operation working state. The anti-theft effect of the rectifier can be improved.

Description

Anti-theft method, device and equipment for rectifier and storage medium
Technical Field
The invention relates to the technical field of rectifier management, in particular to an anti-theft method, device and equipment for a rectifier.
Background
Communication base stations are nowadays often provided with a modular power supply, wherein the rectifier is a rectifying device, i.e. a device converting alternating current into direct current. It has two main functions: firstly, alternating current is converted into direct current, and the direct current is supplied to a load after being filtered or is supplied to an inverter; second, a charging voltage is supplied to the secondary battery. Therefore, the rectifier plays an important role in the communication base station. However, in the prior art, the situation that the rectifier is stolen often occurs, and the stolen rectifier can still be normally used, so that the anti-theft effect of the rectifier is poor.
Disclosure of Invention
The disclosure provides a method and a device for preventing a rectifier from being stolen, electronic equipment and a storage medium, and aims to solve the problem that the anti-theft effect of the rectifier is poor.
According to an aspect of the present disclosure, there is provided a method of preventing an burglary of a rectifier, including:
the rectifier acquires a locking state;
the rectifier judges whether the locking state meets a preset condition or not;
when the locking state fails to meet the preset condition, the rectifier judges whether an unlocking condition is met;
when the rectifier fails to meet the unlocking condition, the rectifier is adjusted to an abnormal operation working state.
According to another aspect of the present disclosure, there is provided a rectifier anti-theft device including:
the acquisition module is used for acquiring a locking state;
the first judgment module is used for judging whether the locking state meets a preset condition or not;
the second judgment module is used for judging whether an unlocking condition is met or not when the locking state fails to meet the preset condition;
and the adjusting module is used for adjusting to an abnormal operation working state when the rectifier fails to meet the unlocking condition.
According to another aspect of the present disclosure, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a rectifier anti-theft method provided by the present disclosure.
According to another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium storing computer instructions for causing the computer to perform a rectifier anti-theft method provided by the present disclosure.
According to the method, the locking state of the rectifier is firstly obtained, namely whether the rectifier starts to prevent burglary and is confirmed to be locked to be used by a corresponding insertion frame, after the anti-burglary is confirmed to be started and the corresponding insertion frame is locked, the rectifier judges whether the locking state meets the preset condition for combined use with the corresponding insertion frame matched with the rectifier, if the rectifier fails to meet the preset condition, the unlocking operation of the rectifier is completed through inputting a verification code, and if the rectifier fails to complete correct unlocking, the rectifier is adjusted to be in an abnormal operation working state, so that the anti-burglary and unlocking operation of the rectifier can be completed, and the anti-burglary effect of the rectifier is further improved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
fig. 1 is a flow chart of a method for preventing a rectifier from being stolen according to the present disclosure;
FIG. 2 is a flow chart of an embodiment of a method for preventing theft of a rectifier according to the present disclosure;
FIG. 3 is a block diagram of a rectifier anti-theft device provided by the present disclosure;
fig. 4 is a block diagram of an electronic device for implementing a rectifier anti-theft method of an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of embodiments of the present disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Referring to fig. 1, fig. 1 is a flowchart illustrating an anti-theft method for a rectifier according to the present disclosure, as shown in fig. 1, including the following steps:
and step S101, the rectifier acquires a locking state.
The locking state may be a connection use state between the rectifier and the insertion frame, for example: the rectifier is connected with the plug frame, namely the rectifier is put into use, and the rectifier can obtain a locking request for the plug frame.
The rectifier may transmit information of a locking request to the plug frame when the rectifier is used in a matched combination with the plug frame, and the rectifier finally determines a locking state with the plug frame.
And S102, judging whether the locking state meets a preset condition by the rectifier.
After the rectifier is locked to the insertion frame, it is determined whether the locked state satisfies a preset condition, where the preset condition may be whether the rectifier and the insertion frame are in a corresponding matching relationship, and the matching authentication relationship between the rectifier and the insertion frame may be determined through algorithm authentication, for example: the rectifier is locked to the inserting frame for use, algorithm authentication is carried out between the rectifier and the inserting frame, and if the algorithm authentication is passed, namely the rectifier and the inserting frame are matched with each other, the locking state acquired by the rectifier meets a preset condition; the rectifier is locked to the inserting frame for use, algorithm authentication is carried out between the rectifier and the inserting frame, and if the algorithm authentication fails, namely the rectifier is not matched with the inserting frame, the locking state acquired by the rectifier does not meet the preset condition.
And step S103, when the locking state fails to meet the preset condition, the rectifier judges whether an unlocking condition is met.
If the locked state obtained by the rectifier fails to satisfy the preset condition, that is, the algorithm authentication between the rectifier and the insertion frame fails, and there is no mutual matching relationship between the rectifier and the insertion frame, the rectifier needs to be adjusted to a normal operating state by unlocking, and the unlocking operation may be completed by inputting a correct verification code, for example: and the rectifier judges that the rectifier and the inserting frame are not in a mutually matched relation, the rectifier prompts that unlocking operation is needed at the moment, a serial number corresponding to the rectifier is generated, a corresponding verification code is obtained by inputting the serial number through an off-line server, and the verification code is input into the rectifier to obtain a correct unlocking result, so that unlocking is finished.
And step S104, when the rectifier fails to meet the unlocking condition, adjusting the rectifier to be in an abnormal operation working state.
The failure of the rectifier to satisfy the unlocking condition may be an authentication matching information error, for example: and if the verification code is input in error in the rectifier, namely the rectifier does not meet the unlocking condition, the rectifier cannot normally work.
According to the method, the locking state between the rectifier and the inserting frame is firstly obtained through the rectifier, whether the locking state meets a preset condition or not is judged, namely an algorithm authentication result between the rectifier and the inserting frame is obtained, if the algorithm authentication result passes, the fact that the rectifier and the inserting frame are matched with each other is shown, if the algorithm authentication fails, whether an unlocking condition is met or not needs to be judged through the rectifier, if the unlocking condition passes, the unlocking is successful, and if the unlocking condition does not meet, the rectifier is adjusted to be in an abnormal working state. The anti-theft of the rectifier is completed through locking and unlocking operations, and the anti-theft effect of the rectifier is improved.
It should be noted that the above-mentioned rectifier may be protected against theft by proximal and distal operations, such as: for the near-end opening anti-theft mode, the anti-theft mode is opened through the operation of the rectifier body, after the anti-theft mode is opened, the rectifier and the inserting frame are subjected to algorithm authentication, other inserting frames are locked when used, and the normal operation cannot be realized, in addition, the near-end opening anti-theft mode needs to pass through secondary authentication, and the mode of putting the rectifier into the mode is avoided because the near-end opening anti-theft mode cannot be closed again, and the abnormal opening of the rectifier is avoided; for the far-end opening anti-theft mode, the anti-theft mode is opened by remotely controlling the rectifier, and compared with the anti-theft mode opened at the near end, the far-end opening put-in mode can be closed.
In addition, the algorithm authentication between the rectifier and the insertion frame may be a one-to-one correspondence relationship, or may be a one-to-many relationship, for example: if the algorithm authentication between the rectifier and the inserting frame is in one-to-one correspondence, namely the rectifier can only complete the algorithm authentication with one group of inserting frames, and the rectifier can only operate in the inserting frame in a normal working state; if the algorithm authentication between the rectifier and the insert frame is a one-to-many relationship, namely the rectifier can complete the algorithm authentication with a plurality of groups of insert frames, the plurality of groups of insert frames can be located in one area, namely the rectifier can be matched with the insert frames in the one area for use.
As an alternative embodiment, the rectifier acquires the locked state, including: the rectifier obtains the detected locking information, which includes a locking request of the rectifier to an insertion frame.
In this embodiment, the rectifier acquires a locked state, where the locked state is a locked state between the rectifier and an insertion frame, the rectifier acquires detected lock information with the insertion frame, and the lock information includes a lock request of the rectifier to the insertion frame, for example: the rectifier is assembled in the inserting frame, the rectifier detects whether the rectifier is locked to the inserting frame for use, if the rectifier is not locked to the inserting frame, the rectifier is normally used, and if the rectifier is locked to the inserting frame, authentication is needed. The rectifier acquires the information of locking or not needing to lock the current inserting frame, the locking state is determined according to the locking information, and whether the rectifier is combined with the matched inserting frame or not is determined according to the locking state.
As an optional implementation manner, the determining, by the rectifier, whether the locked state meets a preset condition includes: and the rectifier judges whether the rectifier is combined with the corresponding insertion frame for use, wherein the rectifier and the insertion frame are subjected to algorithm authentication, if the rectifier and the insertion frame pass the algorithm authentication, the rectifier is confirmed to be matched and corresponding to the insertion frame, and the rectifier is matched and corresponding to the insertion frame to indicate that the locking state meets the preset condition.
In this embodiment, the rectifier determines whether a preset condition is satisfied in a state where the rectifier is locked with the insertion frame, where the preset condition is whether the rectifier and the insertion frame are matched with each other, and the rectifier and the insertion frame may be equipped with authentication devices that can identify each other, for example: the rectifier and the insertion frame are subjected to algorithm authentication through an identification device, if the rectifier and the insertion frame are subjected to algorithm authentication, the rectifier is confirmed to be matched and corresponding to the insertion frame, the rectifier is matched and corresponding to the insertion frame to indicate that the locking state meets the preset condition, if the rectifier is failed to be authenticated through the algorithm authentication of the insertion frame, the rectifier is confirmed to be not matched with the insertion frame, and the rectifier is not matched with the insertion frame to indicate that the locking state does not meet the preset condition. Whether normal work is carried out or not is determined by obtaining the matching relation between the rectifier and the inserting frame, and the anti-theft effect of the rectifier is improved.
It should be noted that the algorithm authentication between the rectifier and the insertion frame may be a one-to-one correspondence relationship, or may be a one-to-many relationship, for example: if the algorithm authentication between the rectifier and the inserting frame is in one-to-one correspondence, namely the rectifier can only complete the algorithm authentication with one group of inserting frames, and the rectifier can only operate in the inserting frame in a normal working state; if the algorithm authentication between the rectifier and the insert frame is a one-to-many relationship, namely the rectifier can complete the algorithm authentication with a plurality of groups of insert frames, the plurality of groups of insert frames can be located in one area, namely the rectifier can be matched with the insert frames in the one area for use.
As an optional implementation manner, before the rectifier determines whether the unlocking condition is satisfied, the method further includes: the rectifier sends out information prompting unlocking, and the rectifier generates a corresponding serial number; the rectifier generates a verification code according to the serial number through an off-line server, and the verification code is used for inputting and unlocking the rectifier on the rectifier; the judging whether the rectifier meets the unlocking condition includes: and when the locking state of the rectifier fails to meet the preset condition and the verification code generated according to the serial number is input into the rectifier, judging whether the rectifier meets an unlocking condition.
Wherein, the rectifier sends out the information of suggestion unblock, and the suggestion of this unblock information can be through the suggestion user of buzzer, flashing light and small-size display etc. and carry out the unblock operation, for example: before the rectifier meets the unlocking condition, the rectifier can send out sound through a buzzer to prompt a user to carry out verification operation; before the rectifier meets the unlocking condition, the rectifier can prompt a user to carry out verification operation through long-time lighting of a flashing lamp or flashing; before the rectifier meets the unlocking condition, the rectifier prompts a user to perform verification operation through the small display. The embodiment of the present invention is not limited thereto.
In this embodiment, the rectifier generates a single corresponding serial number, and the serial number is input through the off-line server to generate a verification code that can unlock the rectifier, and the verification code is input to the rectifier body to determine whether the verification code can unlock the rectifier. According to the embodiment of the invention, the unique method for unlocking the rectifier is determined by inputting the exclusive verification code, so that the anti-theft effect of the rectifier is improved.
It should be noted that the rectifier corresponds to a unique serial number, and the verification code generated by the offline server is only valid for 24 hours, and when the verification code generated by the rectifier exceeds the valid time limit, the rectifier cannot be unlocked according to the verification code generated by the rectifier, and meanwhile, when the verification code is generated according to the serial number, the user needs to be authenticated, for example: the method comprises the steps that a user obtains a serial number of the rectifier, when the serial number is input into an offline server, identity authentication needs to be carried out on the user, if the user is an unauthorized user, unlocking operation of the rectifier is not authorized, and a corresponding verification code cannot be generated; if the user is an authorized user, the corresponding verification code can be generated through the acquired serial number to complete unlocking.
As an optional implementation, before the rectifier is adjusted to the abnormal operation state, the method further includes: input verification code information detected by the rectifier; judging whether the verification code is matched with a verification code needing to be unlocked by the rectifier; the adjusting the working operation state of the rectifier comprises the following steps: when the locking state of the rectifier does not meet the preset condition and the rectifier fails to meet the unlocking condition, namely the verification code is not matched with the verification code needing to be unlocked, the rectifier fails to be unlocked, and the rectifier is in a normal running state in a delayed closing mode.
The rectifier may send a prompt message after verification, and the prompt message may prompt a user to perform an unlocking operation through a buzzer, a flashing light, a small display, and the like, for example: the rectifier can send out sound through a buzzer to prompt a user to verify the result; the rectifier can prompt a user to verify a result through long-time lighting of a flashing lamp or flashing; the rectifier may prompt the user for the authentication result via a small display. The embodiment of the present invention is not limited thereto.
In this embodiment, before the rectifier is adjusted to the abnormal operating state, the rectifier determines the input verification code information, if the verification code information is correct, the rectifier keeps the normal operating state, and if the verification code information is wrong, the rectifier is adjusted to the abnormal operating state, which may be locked after the rectifier operates for 30 to 120 minutes in a delayed manner. The embodiment of the invention completes the unlocking authentication of the rectifier by inputting the unique verification code, thereby improving the anti-theft effect of the rectifier.
It should be noted that, if the rectifier inputs the correct verification code to complete the unlocking operation, the rectifier may restore the factory equipment state, that is, the rectifier may be re-associated with a new frame insertion device.
As an optional implementation manner, before the determining whether the verification code matches the verification code that the rectifier needs to be unlocked, the method further includes: the rectifier acquires unlocking log information, wherein the log information comprises an unlocking account number, unlocking operation time, unlocking equipment identification and unlocking personnel information; the rectifier sends the unlocking log information to an offline server, so that the offline server generates unlocking operation record information of the rectifier according to the unlocking log information.
In the embodiment of the invention, the rectifier can acquire unlocking log information, the rectifier sends the acquired unlocking log information to the offline server, and the offline server can generate a relevant unlocking operation record according to the unlocking log information, wherein the unlocking operation record comprises an unlocking account number, unlocking operation time, an unlocking equipment identifier and unlocking personnel information, and the anti-theft complete process of the rectifier is mastered by acquiring the information.
Referring to fig. 2, fig. 2 is a flowchart illustrating an embodiment of an anti-theft method for a rectifier according to the present disclosure, where as shown in fig. 2, a user firstly confirms to turn on an anti-theft function of the rectifier, confirms whether to lock the rectifier to a current frame, and if it is confirmed that the current frame is not locked, the rectifier normally operates; if the selection of the locking insertion frame is confirmed, algorithm authentication needs to be carried out between the rectifier and the insertion frame, whether the rectifier is locked or not is confirmed to be the insertion frame which is correspondingly matched, and if the algorithm authentication is passed, namely the rectifier is locked to be the insertion frame which is correspondingly matched, the rectifier normally runs and is used; if the rectifier is locked and does not correspond to the matched insertion frame, the rectifier prompts a user to unlock and provides a corresponding serial number, the user inputs the serial number corresponding to the rectifier through an off-line server to generate a verification code, the verification code is input to the rectifier to judge whether the verification code is correct, and if the verification code is correct, the unlocking is successful; if the verification code is wrong, the unlocking fails, the output of the rectifier is delayed and closed, and the closed rectifier cannot be normally used. The embodiment of the invention increases the stealing difficulty of the rectifier, and improves the anti-theft effect of the rectifier compared with the prior art.
Referring to fig. 3, fig. 3 is a diagram of a rectifier anti-theft device according to the present disclosure, and as shown in fig. 3, the rectifier anti-theft device 300 includes:
an obtaining module 301, configured to obtain a locking state;
a first determining module 302, configured to determine whether the locking state meets a preset condition;
a second judging module 303, configured to judge whether an unlocking condition is met when the locking state fails to meet the preset condition;
and the adjusting module 304 is used for adjusting to an abnormal operation working state when the rectifier fails to meet the unlocking condition.
Optionally, the rectifier acquires a locked state, including: the rectifier obtains the detected locking information, which includes a locking request of the rectifier to an insertion frame.
Optionally, the rectifier determines whether the locking state meets a preset condition, including: and the rectifier judges whether the rectifier is combined with the corresponding insertion frame for use, wherein the rectifier and the insertion frame are subjected to algorithm authentication, if the rectifier and the insertion frame pass the algorithm authentication, the rectifier is confirmed to be matched and corresponding to the insertion frame, and the rectifier is matched and corresponding to the insertion frame to indicate that the locking state meets a preset condition.
Optionally, before the rectifier determines whether the unlocking condition is satisfied, the method further includes: the rectifier sends out information for prompting unlocking, and the rectifier generates a corresponding serial number; the rectifier generates a verification code according to the serial number through an off-line server, and the verification code is used for inputting and unlocking the rectifier on the rectifier; the judging whether the rectifier meets the unlocking condition includes: and when the locking state of the rectifier fails to meet the preset condition and the verification code generated according to the serial number is input into the rectifier, judging whether the rectifier meets an unlocking condition.
Optionally, before the rectifier is adjusted to the abnormal operation working state, the method further includes: input verification code information detected by the rectifier; judging whether the verification code is matched with a verification code needing to be unlocked by the rectifier; the adjusting the working operation state of the rectifier comprises the following steps: when the locking state of the rectifier does not meet the preset condition and the rectifier fails to meet the unlocking condition, namely the verification code is not matched with the verification code needing to be unlocked, the rectifier fails to be unlocked, and the rectifier is in a normal running state in a delayed closing mode.
Optionally, before the determining whether the verification code matches with the verification code that the rectifier needs to be unlocked, the method further includes: the rectifier acquires unlocking log information, wherein the log information comprises an unlocking account number, unlocking operation time, unlocking equipment identification and unlocking personnel information; the rectifier sends the unlocking log information to an offline server, so that the offline server generates unlocking operation record information of the rectifier according to the unlocking log information.
According to an embodiment of the present disclosure, the present disclosure also provides an electronic device and a readable storage medium.
FIG. 2 shows a schematic block diagram of an example electronic device 200 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 4, the device 400 comprises a computing unit 401, which may perform various suitable actions and processes according to a computer program stored in a Read Only Memory (ROM)402 or a computer program loaded from a storage unit 408 into a Random Access Memory (RAM) 403. In the RAM 403, various programs and data required for the operation of the device 300 can also be stored. The computing unit 401, ROM 402, and RAM 403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
A number of components in device 400 are connected to I/O interface 405, including: an input unit 406 such as a keyboard, a mouse, or the like; an output unit 407 such as various types of displays, speakers, and the like; a storage unit 408 such as a magnetic disk, optical disk, or the like; and a communication unit 409 such as a network card, modem, wireless communication transceiver, etc. The communication unit 409 allows the device 400 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
Computing unit 401 may be a variety of general and/or special purpose processing components with processing and computing capabilities. Some examples of the computing unit 401 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The computing unit 401 performs the various methods and processes described above, such as the rectifier anti-theft method. For example, in some embodiments, the rectifier anti-theft method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 408. In some embodiments, part or all of the computer program may be loaded and/or installed onto the device 400 via the ROM 402 and/or the communication unit 409. When the computer program is loaded into RAM 403 and executed by computing unit 401, one or more steps of the rectifier anti-theft method described above may be performed. Alternatively, in other embodiments, the computing unit 401 may be configured to perform the rectifier anti-theft method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user may provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server with a combined blockchain.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel or sequentially or in different orders, and are not limited herein as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (9)

1. An anti-theft method for a rectifier, the anti-theft method for the rectifier comprises the following steps:
the rectifier acquires a locking state;
the rectifier judges whether the locking state meets a preset condition or not;
the rectifier sends out information prompting unlocking, and the rectifier generates a corresponding serial number; the rectifier generates a verification code according to the serial number through an off-line server, and the verification code is used for inputting and unlocking the rectifier on the rectifier;
when the locking state fails to meet the preset condition, the rectifier judges whether an unlocking condition is met, including: when the locking state of the rectifier cannot meet the preset condition and the verification code generated according to the serial number is input to the rectifier, judging whether the rectifier meets an unlocking condition;
when the rectifier fails to meet the unlocking condition, the rectifier is adjusted to an abnormal operation working state.
2. The method of claim 1, wherein the rectifier acquires a locked state, comprising:
the rectifier obtains the detected locking information, which includes a locking request of the rectifier to an insertion frame.
3. The method for preventing theft of a rectifier according to claim 1, wherein the rectifier determining whether the locked state satisfies a predetermined condition comprises:
and the rectifier judges whether the rectifier is combined with the corresponding insertion frame for use, wherein the rectifier and the insertion frame are subjected to algorithm authentication, if the rectifier and the insertion frame pass the algorithm authentication, the rectifier is confirmed to be matched and corresponding to the insertion frame, and the rectifier is matched and corresponding to the insertion frame to indicate that the locking state meets a preset condition.
4. The method of claim 1, wherein prior to the rectifier being conditioned to an abnormal operating condition, the method further comprises:
input verification code information detected by the rectifier;
judging whether the verification code is matched with a verification code needing to be unlocked by the rectifier;
the adjusting the working operation state of the rectifier comprises the following steps:
when the locking state of the rectifier does not meet the preset condition and the rectifier fails to meet the unlocking condition, namely the verification code is not matched with the verification code needing to be unlocked, the rectifier fails to be unlocked, and the rectifier is in a normal running state in a delayed closing mode.
5. The method of claim 4, wherein before determining whether the verification code matches a verification code that the rectifier needs to be unlocked, the method further comprises:
the rectifier acquires unlocking log information, wherein the log information comprises an unlocking account number, unlocking operation time, unlocking equipment identification and unlocking personnel information;
the rectifier sends the unlocking log information to an offline server, so that the offline server generates unlocking operation record information of the rectifier according to the unlocking log information.
6. A rectifier anti-theft device, comprising:
the acquisition module is used for acquiring a locking state;
the first judgment module is used for judging whether the locking state meets a preset condition or not;
the second judgment module is used for judging whether an unlocking condition is met or not when the locking state fails to meet the preset condition; wherein, the rectifier judging whether the unlocking condition is met comprises the following steps: when the locking state of the rectifier cannot meet the preset condition and a verification code generated according to a serial number is input to the rectifier, judging whether the rectifier meets an unlocking condition; before judging whether unlocking conditions are met, the rectifier sends information prompting unlocking, and the rectifier generates a corresponding serial number; the rectifier generates a verification code according to the serial number through an off-line server, and the verification code is used for inputting and unlocking the rectifier on the rectifier;
and the adjusting module is used for adjusting to an abnormal operation working state when the rectifier fails to meet the unlocking condition.
7. The anti-theft device for a rectifier according to claim 6, wherein the rectifier determines whether the locked state satisfies a predetermined condition, including:
and the rectifier judges whether the rectifier is combined with the corresponding insertion frame for use, wherein the rectifier and the insertion frame are subjected to algorithm authentication, if the rectifier and the insertion frame pass the algorithm authentication, the rectifier is confirmed to be matched and corresponding to the insertion frame, and the rectifier is matched and corresponding to the insertion frame to indicate that the locking state meets a preset condition.
8. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 5.
9. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1 to 5.
CN202111382637.8A 2021-11-22 2021-11-22 Anti-theft method, device and equipment for rectifier and storage medium Active CN114033261B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111382637.8A CN114033261B (en) 2021-11-22 2021-11-22 Anti-theft method, device and equipment for rectifier and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111382637.8A CN114033261B (en) 2021-11-22 2021-11-22 Anti-theft method, device and equipment for rectifier and storage medium

Publications (2)

Publication Number Publication Date
CN114033261A CN114033261A (en) 2022-02-11
CN114033261B true CN114033261B (en) 2022-08-02

Family

ID=80145038

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111382637.8A Active CN114033261B (en) 2021-11-22 2021-11-22 Anti-theft method, device and equipment for rectifier and storage medium

Country Status (1)

Country Link
CN (1) CN114033261B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114329613A (en) * 2022-01-05 2022-04-12 中国铁塔股份有限公司 Anti-theft method and device for rectifier module and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105787316A (en) * 2016-02-29 2016-07-20 联想(北京)有限公司 Information processing method and electronic device
CN113410971A (en) * 2021-05-16 2021-09-17 武汉领普科技有限公司 Self-generating switch and processing method and control system thereof

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2323528Y (en) * 1997-09-12 1999-06-09 张作庆 Intelligent facsimile apparatus protector
CN1073773C (en) * 1997-09-19 2001-10-24 义隆电子股份有限公司 Device for preventing fraudulent use of telephone subscriber line
US20020024418A1 (en) * 1999-08-11 2002-02-28 Ayala Raymond F. Method for a key to selectively allow access to an enclosure
US6606260B2 (en) * 2001-10-29 2003-08-12 The Chamberlain Group, Inc. Switch mode power supply for a telephone entry system or the like
CN101938146B (en) * 2009-06-30 2014-12-24 曹松伟 Intelligent power grid group charging electric source induced supply system
KR102693434B1 (en) * 2016-05-13 2024-08-09 삼성전자주식회사 Electronic apparatus providing electronic payment and operating method thereof
CN106898064A (en) * 2017-01-09 2017-06-27 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
EP3664970A4 (en) * 2017-08-07 2021-08-04 Milwaukee Electric Tool Corporation Power tool with irreversably lockable compartment
CN107635071A (en) * 2017-09-27 2018-01-26 维沃移动通信有限公司 An anti-theft method, mobile terminal and computer-readable storage medium
CN108420206A (en) * 2018-03-09 2018-08-21 北京兰德华电子技术有限公司 Intelligent key cabinet system
CN109272617B (en) * 2018-08-31 2020-08-07 北京三快在线科技有限公司 Unlocking verification method, server, door lock, electronic device and storage medium
CN109764779B (en) * 2019-02-06 2021-11-23 华夏世昌(北京)科技有限公司 Digital electronic detonator detonation system and method based on double-wire bus
CN111259463B (en) * 2020-01-08 2022-09-09 Oppo(重庆)智能科技有限公司 Anti-theft protection method and apparatus, electronic device, computer readable storage medium
CN111311840B (en) * 2020-01-20 2021-10-22 临沂大学 A logistics lockbox, logistics management system and method
CN111734222B (en) * 2020-07-02 2021-06-08 北京兰德华电子技术有限公司 Intelligent key cabinet
DE202021102107U1 (en) * 2021-04-20 2021-04-27 Beijing Landwell Electron Technology Co.,Ltd. Intelligent key cabinet with four-corner-inserted combination frame housing

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105787316A (en) * 2016-02-29 2016-07-20 联想(北京)有限公司 Information processing method and electronic device
CN113410971A (en) * 2021-05-16 2021-09-17 武汉领普科技有限公司 Self-generating switch and processing method and control system thereof

Also Published As

Publication number Publication date
CN114033261A (en) 2022-02-11

Similar Documents

Publication Publication Date Title
CN109624919B (en) Vehicle anti-theft system configuration method, computer-readable storage medium, and terminal
CN109272617B (en) Unlocking verification method, server, door lock, electronic device and storage medium
CN104282058B (en) The method for unlocking of the safety intelligent lock system of band video monitoring based on bluetooth
CN111563983B (en) Multi-lock unlocking authorization control method and system based on dynamic password and lockset
US20150186677A1 (en) Server chassis physical security enforcement
CN109840975A (en) Remote authorization unlocking system and method without networking
CN108090331A (en) Unlocking method and equipment
CN114033261B (en) Anti-theft method, device and equipment for rectifier and storage medium
CN101182744B (en) Two-way controlling electronic door lock
CN105827405A (en) Remotely-controlled safety lock device and remote control method thereof
CN113411311A (en) ECU (electronic control Unit) diagnosis authorization verification method, storage medium and system
CN109003368B (en) Bluetooth access control system offline password updating method and Bluetooth access control system
CN115782814A (en) Method and device for unlocking vehicle in non-contact manner
JP2018529868A (en) Dangerous equipment control method and computer program therefor
CN105205886A (en) Server, access control equipment and management terminal and method for community security and protection
CN112037383B (en) Intelligent door lock and authority judgment method and application system thereof
CN110490338A (en) A kind of electromechanical equipment genuine part method of calibration based on cloud computing
EP3831644B1 (en) Charging system and method of a battery of an electric vehicle
CN113971851A (en) Method and device for unlocking bank note box
CN104376251A (en) Computer, computer start-up control system and computer start-up control method
CN111080864A (en) Express cabinet door lock opening method and device and express cabinet
CN111090841A (en) A kind of authentication method and device for industrial control system
CN114170709B (en) Cash box management method and system based on Internet of Things
CN113691372B (en) Key dynamic protection method of charge centralized controller
CN111770100B (en) Method and system for verifying safe access of external equipment to Internet of things terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant