CN109918932A - The access recognition methods of extension software users and system based on MES system - Google Patents
The access recognition methods of extension software users and system based on MES system Download PDFInfo
- Publication number
- CN109918932A CN109918932A CN201910183622.5A CN201910183622A CN109918932A CN 109918932 A CN109918932 A CN 109918932A CN 201910183622 A CN201910183622 A CN 201910183622A CN 109918932 A CN109918932 A CN 109918932A
- Authority
- CN
- China
- Prior art keywords
- information
- temporary visit
- user
- access
- visit number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000009826 distribution Methods 0.000 claims description 29
- 230000008569 process Effects 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 5
- 230000006835 compression Effects 0.000 claims description 3
- 238000007906 compression Methods 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 description 6
- 238000012544 monitoring process Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 125000000174 L-prolyl group Chemical group [H]N1C([H])([H])C([H])([H])C([H])([H])[C@@]1([H])C(*)=O 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000006837 decompression Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000010327 methods by industry Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of the access recognition methods of extension software users and system based on MES system, wherein, the described method includes: MES system obtains accessing request information, and a temporary visit number is distributed to user to be visited based on subscriber identity information, the temporary visit number includes identity information, timing information and authority information;And, when user is logged in using temporary visit number, MES system identifies the temporary visit number, and judge whether the temporary visit number meets login and require according to the identity information, the timing information and the authority information, if meeting, allow to log in, and unlock the access content that the authority information is included, if not meeting, refuse to log in, and retransmits accessing request information to MES system.Permission is distributed to user in such a way that MES system distributes temporary visit number, while can be used for multiple users, the management of account is facilitated and safety is higher.
Description
Technical field
The present invention relates to access identification technology field, in particular to a kind of extension software users access based on MES system
Recognition methods and system.
Background technique
Automated production process largely needs to rely on computer software realization, in particular for the two of product design
Dimension, three-dimensional graphics software, currently used graphics software have CAD, UG, Pro/Engineer, SolidWorks etc., these are soft
Part generally requires the account and password that input developer provides when in use, and generally has several productions in a workshop, sets
Meter personnel require using these softwares, for the safety and convenience of management, need to carry out account and password reasonable
Distribution and permission control, and be at present typically all by manually being supervised, safety is low, and manages relatively complicated.
Summary of the invention
In order to solve the above technical problems, the present invention provides a kind of, the extension software users based on MES system access identification
Method and system have the advantages that facilitate management and highly-safe.
In order to achieve the above objectives, technical scheme is as follows:
A kind of extension software users access recognition methods based on MES system, comprising:
MES system obtains accessing request information, and distributes a temporary visit to user to be visited based on subscriber identity information
Number, the temporary visit number includes identity information, timing information and authority information;And
When user is logged in using temporary visit number, MES system identifies the temporary visit number, and believes according to the identity
Breath, the timing information and the authority information judge whether the temporary visit number meets login and require, if meeting, allow
It logs in, and unlocks the access content that the authority information is included and refuse to log in if not meeting, and sent out again to MES system
Send accessing request information.
It realizes above-mentioned technical proposal, when user needs to access extension software and system file, is sent first to MES system
Accessing request information, since the access account that each user uses is different, which represents the identity of user
Information, MES system are the accessing request information according to acquisition, and monitoring personnel can carry out operating and determine whether to agree to the user at this time
Access, however, it is determined that consenting user access, MES system distribute a temporary visit number to the user, and are the temporary visit number point
With access time limit and access authority, forming time limit information and authority information;User using temporary visit number when being logged in, MES system
System first verifies temporary visit number, is required with determining whether the temporary visit number meets login, if the temporary visit number
Identity information be verified and login time is within the access time limit, then it represents that meet login and require, user can login successfully,
MES system opens corresponding access content to user according to authority information, requires otherwise, it means that not meeting login, Yong Huwu
Method logs in, and sends accessing request information to MES system again simultaneously, and MES system is waited to redistribute temporary visit number;Pass through
The mode that MES system distributes temporary visit number distributes permission to user, while can use for multiple users, facilitates account
Number management and safety it is higher.
As a preferred solution of the present invention, the subscriber identity information includes hierarchical information and work number information, described
A temporary visit number is distributed to user to be visited based on subscriber identity information to specifically include:
Based on the corresponding generation timing information of the hierarchical information and authority information, based on the corresponding generation body of the work number information
Part information;And
The timing information, the authority information and the work number information are arranged according to predetermined policy to be formed it is described interim
Access number, and feed back to user to be visited.
Realize above-mentioned technical proposal, the time limit of the lower distribution of the level of user less, permission it is smaller, by timing information, power
Limit information and identity information can be integrally formed temporary visit number distribution to user.
As a preferred solution of the present invention, described according to the identity information, the timing information and the permission
Information judges whether the temporary visit number meets login and require specifically:
According to the identity information read user identity, according to the timing information judge the temporary visit number whether
It is logged within the scope of time limit, judges whether the temporary visit number reaches access authority requirement according to the authority information.
As a preferred solution of the present invention, if the temporary visit number reaches the timing information in access process
Corresponding access time limit, MES system lock all access contents, and send to user and re-request dialog box.
Above-mentioned technical proposal is realized, if reaching the access time limit of distribution in access process, by sending again to user
Dialog box is requested, user is prompted to apply for temporary visit number again.
As a preferred solution of the present invention, when being accessed by the temporary visit number, carrying out data transmission
Before, data to be transmitted is carried out compression processing by MES system.
It realizes above-mentioned technical proposal, is transmitted again after file is compressed, so that transmission speed is faster.
As a preferred solution of the present invention, the MES system is also used to be unregistered place to the temporary visit number
Reason.
On the other hand, the present invention also provides a kind of, and the extension software users based on MES system access identifying system, comprising:
Acquiring unit, for obtaining the accessing request information of user;
Allocation unit, for distributing a temporary visit number, the interim visit to user to be visited based on subscriber identity information
Question mark includes identity information, timing information and authority information;And
Authentication unit, the temporary visit number for identification, and according to the identity information, the timing information and described
Authority information judges whether the temporary visit number meets login and require;
When the temporary visit number, which meets login, to be required, the authentication unit allows user to log in, and unlocks the power
The access content that limit information is included, when the temporary visit number, which does not meet login, to be required, the authentication unit refuses user
It logs in, and retransmits accessing request information to the acquiring unit.
Realize above-mentioned technical proposal, by acquiring unit obtain user accessing request information, and to the identity of user into
Row identification after the completion of identification, carries out operation by monitoring personnel and determines whether to agree to that the user accesses, however, it is determined that consenting user is visited
It asks, i.e., carries out the distribution of temporary visit number by allocation unit, allocation unit is interim for this while distributing temporary visit
Access number distribution access time limit and access authority, forming time limit information and authority information;User is logged in using temporary visit number
When, temporary visit number is verified by authentication unit first, if the identity information of the temporary visit number is verified and steps on
The time is recorded within the access time limit, then it represents that meet login and require, user can login successfully, and open according to authority information to user
Corresponding access content is put, is required otherwise, it means that not meeting login, user can not log in, and simultaneously again to acquiring unit
Accessing request information is sent, acquiring unit is waited to redistribute temporary visit number;Temporary visit number is distributed by allocation unit
Mode distributes permission to user, while can use for multiple users, facilitates the management of account and safety is higher.
As a preferred solution of the present invention, the subscriber identity information includes hierarchical information and work number information, described
Allocation unit includes:
Time limit distribution module, for based on the corresponding generation timing information of the hierarchical information;
Authority distribution module, for based on the corresponding generation authority information of the hierarchical information;
Identity distribution module, for based on the corresponding generation identity information of the work number information;And
Generation module, for arranging the timing information, the authority information and the work number information according to predetermined policy
Column form the temporary visit number, and feed back to user to be visited.
As a preferred solution of the present invention, the authentication unit includes:
Authentication module, for user identity to be read and identified according to the identity information;
Time limit authentication module, for judging whether the temporary visit number steps within the time limit according to the timing information
Record;And
Authority Verification module, for judging whether the temporary visit number reaches access authority and want according to the authority information
It asks.
As a preferred solution of the present invention, the system also includes locking modules, and the locking module is for working as institute
It states when temporary visit number reaches the corresponding access of the timing information in access process and prescribes a time limit, all access contents are locked,
And it is sent to user and re-requests dialog box.
In conclusion the invention has the following beneficial effects:
The present invention is by providing a kind of access recognition methods of extension software users and system based on MES system, wherein institute
The method of stating includes: that MES system obtains accessing request information, and is temporarily visited based on subscriber identity information to user to be visited distribution one
Question mark, the temporary visit number include identity information, timing information and authority information;And temporary visit number is used in user
When login, MES system identifies the temporary visit number, and believes according to the identity information, the timing information and the permission
Breath judges whether the temporary visit number meets login and require, if meeting, allows to log in, and unlock the authority information and wrapped
The access content contained is refused to log in if not meeting, and retransmits accessing request information to MES system.Pass through MES system
The mode for distributing temporary visit number distributes permission to user, while can use for multiple users, facilitates the pipe of account
It manages and safety is higher.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is the system block diagram of the embodiment of the present invention one.
Fig. 2 is the system block diagram of the embodiment of the present invention two.
Fig. 3 is the flow diagram that the present invention implements three.
Number and corresponding component title represented by letter in figure:
1, acquiring unit;2, allocation unit;21, time limit distribution module;22, authority distribution module;23, identity distributes mould
Block;24, generation module;3, authentication unit;31, authentication module;32, time limit authentication module;33, Authority Verification module;4,
Locking module.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Embodiment one
A kind of extension software users access identifying system based on MES system, as shown in Figure 1, comprising: acquiring unit 1 is used
In the accessing request information for obtaining user;Allocation unit 2, for interim to user to be visited distribution one based on subscriber identity information
Access number, temporary visit number include identity information, timing information and authority information;And authentication unit 3, for identification temporarily
Access number, and judge whether temporary visit number meets login and require according to identity information, timing information and authority information;When interim
When access number meets login and requires, authentication unit 3 allows user to log in, and unlocks the access content that authority information is included, when
When temporary visit number does not meet login and requires, authentication unit 3 is refused user and is logged in, and retransmits access to acquiring unit 1 and ask
Seek information.
Specifically, MES system (Manufacturing Execution System, i.e. manufacturing execution system), is to be located at
The management information system towards shop layer between the project management system on upper layer and the Industry Control of bottom, MES system can lead to
It crosses information transmitting and management is optimized to the entire production process completed from order placement to product, MES system can be realized life
The multiple functions such as scheduling, workshop document management, data acquisition, process engineering are produced, realize the collection to lathe in workshop
Middle control;Acquiring unit 1, allocation unit 2 and authentication unit 3 in the present embodiment are controlled by MES system, in the present embodiment
Extension software refers mainly to the two dimensions such as CAD, UG, Pro/Engineer, SolidWorks, three-dimensional graphics software, naturally it is also possible to be
Other manufacture used software, meanwhile, the content to access is logged in the present embodiment using temporary visit number, not only
It further include document and data under MES system unified management including above-mentioned software.
The accessing request information of user is obtained by acquiring unit 1, and the identity of user is identified, identification is completed
Afterwards, it carries out operation by monitoring personnel to determine whether to agree to that the user accesses, however, it is determined that consenting user access passes through allocation unit
2 carry out the distribution of temporary visit number, and allocation unit 2 is distributed for the temporary visit number and accessed while distributing temporary visit
Time limit and access authority, forming time limit information and authority information;User passes through verifying when logging in using temporary visit number first
Unit 3 verifies temporary visit number, if the identity information of the temporary visit number is verified and login time is in access
In limit, then it represents that meet login and require, user can login successfully, and be opened in corresponding access according to authority information to user
Hold, required otherwise, it means that not meeting login, user can not log in, and send access request letter to acquiring unit 1 again simultaneously
Breath waits acquiring unit 1 to redistribute temporary visit number;To user point in such a way that allocation unit 2 distributes temporary visit number
It facilitates the management of account while can be used for multiple users with permission and safety is higher.
Embodiment two
The difference of the present embodiment and other embodiments is: as shown in Fig. 2, in the present embodiment, subscriber identity information packet
Hierarchical information and work number information are included, allocation unit 2 includes: time limit distribution module 21, when for generation corresponding based on hierarchical information
Limit information;Authority distribution module 22, for based on the corresponding generation authority information of hierarchical information;Identity distribution module 23 is used for base
In the corresponding generation identity information of work number information;And generation module 24, it is used for timing information, authority information and work number information
It arranges to form temporary visit number according to predetermined policy, and feeds back to user to be visited.
Hierarchical information represents the Permission Levels of the user, can distinguish in several ways, such as: digital section, word
Female or alphabetical group, array monogram etc., hierarchical information is using the alphabetical group such as Aa, Ba, Bb, Ca, Cb in the present embodiment, equally
, the forms such as digital section, letter or alphabetical group, array monogram can be used also to indicate in work number information, it is preferred that work
The form of number information is different from hierarchical information, for example, the work number information in the present embodiment is made of digital section;
It is different according to the timing information of distribution corresponding to different hierarchical informations and authority information, system can be used
Default setting, can also with someone's monitoring personnel operate select, distribution principle are as follows: higher grade, the power that can be assigned to
Limit and time limit range are bigger, for authority information, the user of corresponding different hierarchical information, in the permission distributed
Holding can also be different;Identity information can be consistent with work number information, can also increase corresponding mark on the basis of work number information
Character string, or the serial number for formation;Authority information and timing information can be consistent with hierarchical information, or with other arrays
Or letter group indicates that temporary visit number can be to arrange according to the sequence of authority information, timing information and identity information to be formed
Array, or serial number is formed by based on the date, the corresponding temporary visit number generated and the authority information of distribution, time limit are believed
Breath and identity information can be entered into MES system, and by logging in temporary visit number, MES system can recognize the temporary visit
Timing information, authority information and identity information corresponding to number.
Authentication unit 3 includes: authentication module 31, for user identity to be read and identified according to identity information;Time limit
Authentication module 32, for judging whether temporary visit number logs within the time limit according to timing information;And Authority Verification mould
Block 33, for judging whether temporary visit number reaches access authority requirement according to authority information.
When being verified, whether time limit authentication module 32 judges temporary visit number within the time limit according to timing information
It logs in, if login time exceeds time limit range, is then judged as that not meeting login requires, Authority Verification module 33 is according to authority information
Judge whether temporary visit number reaches access authority requirement, if exceeding extent of competence, judgement does not meet visiting demand, Yong Huyao
The content of access is in the lock state.
Further, it further includes locking module 4 that the user of the present embodiment, which accesses identifying system, and locking module 4, which is used to work as, faces
When access number prescribe a time limit when reaching the corresponding access of timing information in access process, all access contents are locked, and to user
It sends and re-requests dialog box, so that user is prompted to apply for temporary visit number again, meanwhile, locking module 4 is also used to interim
Access number is unregistered processing.
Embodiment three
A kind of extension software users access recognition methods based on MES system, as shown in Figure 3, comprising:
501, MES system obtains accessing request information, and interim to user to be visited distribution one based on subscriber identity information
Access number, temporary visit number include identity information, timing information and authority information.
Specifically, subscriber identity information includes hierarchical information and work number information, subscriber identity information is based on to use to be visited
Family is distributed a temporary visit number and is specifically included: based on the corresponding generation timing information of hierarchical information and authority information, being believed based on work number
Breath is corresponding to generate identity information;And timing information, authority information and work number information are arranged to be formed temporarily according to predetermined policy
Access number, and feed back to user to be visited;Distribution principle are as follows: the time limit of the lower distribution of the level of user less, permission it is smaller, will
Timing information, authority information and identity information can be integrally formed temporary visit number distribution to user.
502, user using temporary visit number log in when, MES system identify temporary visit number, and according to identity information,
Timing information and authority information judge whether temporary visit number meets login and require, if meeting, allow to log in, and unlock permission
The access content that information is included is refused to log in if not meeting, and retransmits accessing request information to MES system.
Judge whether temporary visit number meets login and require according to identity information, timing information and authority information specifically:
User identity is read according to identity information, judges whether temporary visit number logs within the time limit according to timing information, foundation
Authority information judges whether temporary visit number reaches access authority requirement;Wherein, if temporary visit number reaches in access process
Timing information corresponding access time limit, MES system lock all access contents, and send to user and re-request dialog box,
To prompt user to apply for temporary visit number again.
Further, when being accessed by temporary visit number, before carrying out data transmission, MES system will be to be passed
Transmission of data carries out compression processing, transmits again after file is compressed so that transmission speed is faster, user when checking,
Decompression opening is carried out again.
Further volume, MES system are also used to be unregistered temporary visit number processing, with facilitate to temporary visit number into
Row control.
When user needs to access extension software and system file, accessing request information is sent to MES system first, due to
The access account that each user uses is different, which represents the identity information of user, MES system, that is, basis
The accessing request information of acquisition, monitoring personnel, which can carry out operating, at this time determines whether to agree to that the user accesses, however, it is determined that agrees to use
Family access, MES system distribute a temporary visit number to the user, and are the temporary visit number distribution access time limit and access right
Limit, forming time limit information and authority information;For user when being logged in using temporary visit number, MES system is first to temporary visit number
It is verified, is required with determining whether the temporary visit number meets login, if the identity information of the temporary visit number is verified
And login time is within the access time limit, then it represents that meets login and requires, user can login successfully, and MES system is believed according to permission
It ceases to user and opens corresponding access content, required otherwise, it means that not meeting login, user can not log in, and simultaneously again
Accessing request information is sent to MES system, MES system is waited to redistribute temporary visit number;Interim visit is distributed by MES system
The mode of question mark distributes permission to user, while can use for multiple users, facilitates the management of account and safety
It is higher.
In the above-described embodiments, it emphasizes particularly on different fields to the description of each embodiment, there is no the part being described in detail in some embodiment,
Reference can be made to the related descriptions of other embodiments.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because
According to the present invention, certain steps sequentially or may be carried out simultaneously using other.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, the actions and modules being related to not necessarily this hair
Necessary to bright.
In several embodiments provided herein, it should be understood that disclosed device, it can be real in other way
It is existing.For example, the apparatus embodiments described above are merely exemplary, such as the division of said units, only one kind is patrolled
Volume function division, there may be another division manner in actual implementation, such as multiple units or components can combine or can be with
It is integrated into another system, or some features can be ignored or not executed.Another point, it is shown or discussed mutual
Coupling or communication connection can be through some interfaces, and the indirect coupling or communication connection between device or unit can be electricity
Letter or other forms.
Above-mentioned unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, and without limiting it;Although reference
The present invention will be described in detail for previous embodiment, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of extension software users based on MES system access recognition methods characterized by comprising
MES system obtains accessing request information, and distributes a temporary visit number, institute to user to be visited based on subscriber identity information
Stating temporary visit number includes identity information, timing information and authority information;And
When user is logged in using temporary visit number, MES system identifies the temporary visit number, and according to the identity information,
The timing information and the authority information judge whether the temporary visit number meets login and require, if meeting, allow to step on
Record, and unlock the access content that the authority information is included and refuse to log in if not meeting, and retransmitted to MES system
Accessing request information.
2. the extension software users according to claim 1 based on MES system access recognition methods, which is characterized in that institute
Stating subscriber identity information includes hierarchical information and work number information, and the subscriber identity information that is based on faces to user to be visited distribution one
When access number specifically include:
Based on the corresponding generation timing information of the hierarchical information and authority information, based on the corresponding generation identity letter of the work number information
Breath;And
It arranges the timing information, the authority information and the work number information to form the temporary visit according to predetermined policy
Number, and feed back to user to be visited.
3. the extension software users according to claim 2 based on MES system access recognition methods, which is characterized in that institute
It states and judges whether the temporary visit number meets login and want according to the identity information, the timing information and the authority information
It asks specifically:
User identity is read according to the identity information, judges the temporary visit number whether in the time limit according to the timing information
It is logged in range, judges whether the temporary visit number reaches access authority requirement according to the authority information.
4. the extension software users according to claim 3 based on MES system access recognition methods, which is characterized in that if
The temporary visit number reaches the timing information corresponding access time limit in access process, and MES system will be in all access
Hold locking, and is sent to user and re-request dialog box.
5. the extension software users according to claim 4 based on MES system access recognition methods, which is characterized in that logical
When crossing the temporary visit number and accessing, before carrying out data transmission, MES system carries out data to be transmitted at compression
Reason.
6. the extension software users according to claim 1 based on MES system access recognition methods, which is characterized in that institute
MES system is stated to be also used to be unregistered processing to the temporary visit number.
7. a kind of extension software users based on MES system access identifying system characterized by comprising
Acquiring unit, for obtaining the accessing request information of user;
Allocation unit, for distributing a temporary visit number, the temporary visit number to user to be visited based on subscriber identity information
Include identity information, timing information and authority information;And
Authentication unit, the temporary visit number for identification, and according to the identity information, the timing information and the permission
Information judges whether the temporary visit number meets login and require;
When the temporary visit number, which meets login, to be required, the authentication unit allows user to log in, and unlocks the permission letter
Included access content is ceased, when the temporary visit number, which does not meet login, to be required, the authentication unit refusal user is logged in,
And accessing request information is retransmitted to the acquiring unit.
8. the extension software users according to claim 7 based on MES system access identifying system, which is characterized in that institute
Stating subscriber identity information includes hierarchical information and work number information, and the allocation unit includes:
Time limit distribution module, for based on the corresponding generation timing information of the hierarchical information;
Authority distribution module, for based on the corresponding generation authority information of the hierarchical information;
Identity distribution module, for based on the corresponding generation identity information of the work number information;And
Generation module, for the timing information, the authority information and the work number information to be arranged shape according to predetermined policy
At the temporary visit number, and feed back to user to be visited.
9. the extension software users according to claim 8 based on MES system access identifying system, which is characterized in that institute
Stating authentication unit includes:
Authentication module, for user identity to be read and identified according to the identity information;
Time limit authentication module, for judging whether the temporary visit number logs within the time limit according to the timing information;
And
Authority Verification module, for judging whether the temporary visit number reaches access authority requirement according to the authority information.
10. the extension software users according to claim 7 based on MES system access identifying system, which is characterized in that institute
The system of stating further includes locking module, and the locking module is used to reach the time limit in access process when the temporary visit number
It prescribes a time limit when the corresponding access of information, all access contents is locked, and sent to user and re-request dialog box.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910183622.5A CN109918932A (en) | 2019-03-12 | 2019-03-12 | The access recognition methods of extension software users and system based on MES system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910183622.5A CN109918932A (en) | 2019-03-12 | 2019-03-12 | The access recognition methods of extension software users and system based on MES system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109918932A true CN109918932A (en) | 2019-06-21 |
Family
ID=66964363
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910183622.5A Pending CN109918932A (en) | 2019-03-12 | 2019-03-12 | The access recognition methods of extension software users and system based on MES system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109918932A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625790A (en) * | 2020-04-07 | 2020-09-04 | 青岛奥利普自动化控制系统有限公司 | Electronic signature method and equipment based on MES system |
CN113536365A (en) * | 2021-06-07 | 2021-10-22 | 北京字跳网络技术有限公司 | File access method, device, equipment and medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102103717A (en) * | 2009-12-22 | 2011-06-22 | 西门子公司 | Defining additional resources in a MES user management system |
EP2747001A1 (en) * | 2012-12-20 | 2014-06-25 | Siemens Aktiengesellschaft | A method and a system for granting an access to MES functionalities |
CN104217145A (en) * | 2013-05-30 | 2014-12-17 | 西门子公司 | A method for restricting specific users from accessing predetermined portions of MES screens depending on the state of the web screen page |
CN105429966A (en) * | 2015-11-04 | 2016-03-23 | 浙江宇视科技有限公司 | Method and system of client for obtaining control authority of peripheral front-end equipment |
-
2019
- 2019-03-12 CN CN201910183622.5A patent/CN109918932A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102103717A (en) * | 2009-12-22 | 2011-06-22 | 西门子公司 | Defining additional resources in a MES user management system |
EP2747001A1 (en) * | 2012-12-20 | 2014-06-25 | Siemens Aktiengesellschaft | A method and a system for granting an access to MES functionalities |
CN104217145A (en) * | 2013-05-30 | 2014-12-17 | 西门子公司 | A method for restricting specific users from accessing predetermined portions of MES screens depending on the state of the web screen page |
CN105429966A (en) * | 2015-11-04 | 2016-03-23 | 浙江宇视科技有限公司 | Method and system of client for obtaining control authority of peripheral front-end equipment |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625790A (en) * | 2020-04-07 | 2020-09-04 | 青岛奥利普自动化控制系统有限公司 | Electronic signature method and equipment based on MES system |
CN113536365A (en) * | 2021-06-07 | 2021-10-22 | 北京字跳网络技术有限公司 | File access method, device, equipment and medium |
CN113536365B (en) * | 2021-06-07 | 2022-10-28 | 北京字跳网络技术有限公司 | File access method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109729168B (en) | Data sharing exchange system and method based on block chain | |
CN106790112B (en) | Node operating system integrating lightweight block chains and data updating method | |
CN1860723B (en) | System and methods providing enhanced security model | |
CN108632268A (en) | The method for authenticating and device, storage medium, electronic device that block chain accesses | |
EP2245573B1 (en) | Method for reading attributes from an id token | |
EP2304642B1 (en) | Method for reading attributes from an id token | |
CN110401655A (en) | Access control right management system based on user and role | |
CN105653315B (en) | A kind of node operating system method for down loading based on block chain technology | |
CN110069908A (en) | A kind of authority control method and device of block chain | |
CN110134674A (en) | A kind of money and credit big data monitoring analysis system | |
CN112559627A (en) | Alliance chain-based on-chain-under-chain collaborative electronic medical record data sharing method | |
CN106652109A (en) | Intelligent lock control method, device and lock management server | |
CN109918932A (en) | The access recognition methods of extension software users and system based on MES system | |
CN106586734A (en) | Elevator remote debugging method, application terminal and debugging system | |
CN110474865A (en) | Block chain user right system and implementation method | |
CN108322432A (en) | A kind of mechanism application rights management method and service system based on tree-like tissue model | |
CN102984159A (en) | Secure access logic control method based on terminal access behavior and platform server | |
CN108092945A (en) | Definite method and apparatus, the terminal of access rights | |
CN107689949A (en) | Data base authority management method and system | |
CN112905965B (en) | Financial big data processing system based on block chain | |
CN108924115A (en) | A kind of Simulation spatial service authority control method and system | |
CN110324350A (en) | Identity identifying method and server based on the non-sensitive sensing data in mobile terminal | |
CN109587142A (en) | A kind of the data safety AM access module and equipment of service-oriented stream | |
CN112199445A (en) | Hierarchical structure of pyramidal block chain | |
DE102010010760B4 (en) | A method of assigning a key to a subscriber device to be newly added to a wireless sensor-actuator network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190621 |
|
RJ01 | Rejection of invention patent application after publication |