CN109918932A - The access recognition methods of extension software users and system based on MES system - Google Patents

The access recognition methods of extension software users and system based on MES system Download PDF

Info

Publication number
CN109918932A
CN109918932A CN201910183622.5A CN201910183622A CN109918932A CN 109918932 A CN109918932 A CN 109918932A CN 201910183622 A CN201910183622 A CN 201910183622A CN 109918932 A CN109918932 A CN 109918932A
Authority
CN
China
Prior art keywords
information
temporary visit
user
access
visit number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910183622.5A
Other languages
Chinese (zh)
Inventor
韩少文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Lemou Software Technology Co Ltd
Original Assignee
Suzhou Lemou Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Lemou Software Technology Co Ltd filed Critical Suzhou Lemou Software Technology Co Ltd
Priority to CN201910183622.5A priority Critical patent/CN109918932A/en
Publication of CN109918932A publication Critical patent/CN109918932A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of the access recognition methods of extension software users and system based on MES system, wherein, the described method includes: MES system obtains accessing request information, and a temporary visit number is distributed to user to be visited based on subscriber identity information, the temporary visit number includes identity information, timing information and authority information;And, when user is logged in using temporary visit number, MES system identifies the temporary visit number, and judge whether the temporary visit number meets login and require according to the identity information, the timing information and the authority information, if meeting, allow to log in, and unlock the access content that the authority information is included, if not meeting, refuse to log in, and retransmits accessing request information to MES system.Permission is distributed to user in such a way that MES system distributes temporary visit number, while can be used for multiple users, the management of account is facilitated and safety is higher.

Description

The access recognition methods of extension software users and system based on MES system
Technical field
The present invention relates to access identification technology field, in particular to a kind of extension software users access based on MES system Recognition methods and system.
Background technique
Automated production process largely needs to rely on computer software realization, in particular for the two of product design Dimension, three-dimensional graphics software, currently used graphics software have CAD, UG, Pro/Engineer, SolidWorks etc., these are soft Part generally requires the account and password that input developer provides when in use, and generally has several productions in a workshop, sets Meter personnel require using these softwares, for the safety and convenience of management, need to carry out account and password reasonable Distribution and permission control, and be at present typically all by manually being supervised, safety is low, and manages relatively complicated.
Summary of the invention
In order to solve the above technical problems, the present invention provides a kind of, the extension software users based on MES system access identification Method and system have the advantages that facilitate management and highly-safe.
In order to achieve the above objectives, technical scheme is as follows:
A kind of extension software users access recognition methods based on MES system, comprising:
MES system obtains accessing request information, and distributes a temporary visit to user to be visited based on subscriber identity information Number, the temporary visit number includes identity information, timing information and authority information;And
When user is logged in using temporary visit number, MES system identifies the temporary visit number, and believes according to the identity Breath, the timing information and the authority information judge whether the temporary visit number meets login and require, if meeting, allow It logs in, and unlocks the access content that the authority information is included and refuse to log in if not meeting, and sent out again to MES system Send accessing request information.
It realizes above-mentioned technical proposal, when user needs to access extension software and system file, is sent first to MES system Accessing request information, since the access account that each user uses is different, which represents the identity of user Information, MES system are the accessing request information according to acquisition, and monitoring personnel can carry out operating and determine whether to agree to the user at this time Access, however, it is determined that consenting user access, MES system distribute a temporary visit number to the user, and are the temporary visit number point With access time limit and access authority, forming time limit information and authority information;User using temporary visit number when being logged in, MES system System first verifies temporary visit number, is required with determining whether the temporary visit number meets login, if the temporary visit number Identity information be verified and login time is within the access time limit, then it represents that meet login and require, user can login successfully, MES system opens corresponding access content to user according to authority information, requires otherwise, it means that not meeting login, Yong Huwu Method logs in, and sends accessing request information to MES system again simultaneously, and MES system is waited to redistribute temporary visit number;Pass through The mode that MES system distributes temporary visit number distributes permission to user, while can use for multiple users, facilitates account Number management and safety it is higher.
As a preferred solution of the present invention, the subscriber identity information includes hierarchical information and work number information, described A temporary visit number is distributed to user to be visited based on subscriber identity information to specifically include:
Based on the corresponding generation timing information of the hierarchical information and authority information, based on the corresponding generation body of the work number information Part information;And
The timing information, the authority information and the work number information are arranged according to predetermined policy to be formed it is described interim Access number, and feed back to user to be visited.
Realize above-mentioned technical proposal, the time limit of the lower distribution of the level of user less, permission it is smaller, by timing information, power Limit information and identity information can be integrally formed temporary visit number distribution to user.
As a preferred solution of the present invention, described according to the identity information, the timing information and the permission Information judges whether the temporary visit number meets login and require specifically:
According to the identity information read user identity, according to the timing information judge the temporary visit number whether It is logged within the scope of time limit, judges whether the temporary visit number reaches access authority requirement according to the authority information.
As a preferred solution of the present invention, if the temporary visit number reaches the timing information in access process Corresponding access time limit, MES system lock all access contents, and send to user and re-request dialog box.
Above-mentioned technical proposal is realized, if reaching the access time limit of distribution in access process, by sending again to user Dialog box is requested, user is prompted to apply for temporary visit number again.
As a preferred solution of the present invention, when being accessed by the temporary visit number, carrying out data transmission Before, data to be transmitted is carried out compression processing by MES system.
It realizes above-mentioned technical proposal, is transmitted again after file is compressed, so that transmission speed is faster.
As a preferred solution of the present invention, the MES system is also used to be unregistered place to the temporary visit number Reason.
On the other hand, the present invention also provides a kind of, and the extension software users based on MES system access identifying system, comprising:
Acquiring unit, for obtaining the accessing request information of user;
Allocation unit, for distributing a temporary visit number, the interim visit to user to be visited based on subscriber identity information Question mark includes identity information, timing information and authority information;And
Authentication unit, the temporary visit number for identification, and according to the identity information, the timing information and described Authority information judges whether the temporary visit number meets login and require;
When the temporary visit number, which meets login, to be required, the authentication unit allows user to log in, and unlocks the power The access content that limit information is included, when the temporary visit number, which does not meet login, to be required, the authentication unit refuses user It logs in, and retransmits accessing request information to the acquiring unit.
Realize above-mentioned technical proposal, by acquiring unit obtain user accessing request information, and to the identity of user into Row identification after the completion of identification, carries out operation by monitoring personnel and determines whether to agree to that the user accesses, however, it is determined that consenting user is visited It asks, i.e., carries out the distribution of temporary visit number by allocation unit, allocation unit is interim for this while distributing temporary visit Access number distribution access time limit and access authority, forming time limit information and authority information;User is logged in using temporary visit number When, temporary visit number is verified by authentication unit first, if the identity information of the temporary visit number is verified and steps on The time is recorded within the access time limit, then it represents that meet login and require, user can login successfully, and open according to authority information to user Corresponding access content is put, is required otherwise, it means that not meeting login, user can not log in, and simultaneously again to acquiring unit Accessing request information is sent, acquiring unit is waited to redistribute temporary visit number;Temporary visit number is distributed by allocation unit Mode distributes permission to user, while can use for multiple users, facilitates the management of account and safety is higher.
As a preferred solution of the present invention, the subscriber identity information includes hierarchical information and work number information, described Allocation unit includes:
Time limit distribution module, for based on the corresponding generation timing information of the hierarchical information;
Authority distribution module, for based on the corresponding generation authority information of the hierarchical information;
Identity distribution module, for based on the corresponding generation identity information of the work number information;And
Generation module, for arranging the timing information, the authority information and the work number information according to predetermined policy Column form the temporary visit number, and feed back to user to be visited.
As a preferred solution of the present invention, the authentication unit includes:
Authentication module, for user identity to be read and identified according to the identity information;
Time limit authentication module, for judging whether the temporary visit number steps within the time limit according to the timing information Record;And
Authority Verification module, for judging whether the temporary visit number reaches access authority and want according to the authority information It asks.
As a preferred solution of the present invention, the system also includes locking modules, and the locking module is for working as institute It states when temporary visit number reaches the corresponding access of the timing information in access process and prescribes a time limit, all access contents are locked, And it is sent to user and re-requests dialog box.
In conclusion the invention has the following beneficial effects:
The present invention is by providing a kind of access recognition methods of extension software users and system based on MES system, wherein institute The method of stating includes: that MES system obtains accessing request information, and is temporarily visited based on subscriber identity information to user to be visited distribution one Question mark, the temporary visit number include identity information, timing information and authority information;And temporary visit number is used in user When login, MES system identifies the temporary visit number, and believes according to the identity information, the timing information and the permission Breath judges whether the temporary visit number meets login and require, if meeting, allows to log in, and unlock the authority information and wrapped The access content contained is refused to log in if not meeting, and retransmits accessing request information to MES system.Pass through MES system The mode for distributing temporary visit number distributes permission to user, while can use for multiple users, facilitates the pipe of account It manages and safety is higher.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the system block diagram of the embodiment of the present invention one.
Fig. 2 is the system block diagram of the embodiment of the present invention two.
Fig. 3 is the flow diagram that the present invention implements three.
Number and corresponding component title represented by letter in figure:
1, acquiring unit;2, allocation unit;21, time limit distribution module;22, authority distribution module;23, identity distributes mould Block;24, generation module;3, authentication unit;31, authentication module;32, time limit authentication module;33, Authority Verification module;4, Locking module.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Embodiment one
A kind of extension software users access identifying system based on MES system, as shown in Figure 1, comprising: acquiring unit 1 is used In the accessing request information for obtaining user;Allocation unit 2, for interim to user to be visited distribution one based on subscriber identity information Access number, temporary visit number include identity information, timing information and authority information;And authentication unit 3, for identification temporarily Access number, and judge whether temporary visit number meets login and require according to identity information, timing information and authority information;When interim When access number meets login and requires, authentication unit 3 allows user to log in, and unlocks the access content that authority information is included, when When temporary visit number does not meet login and requires, authentication unit 3 is refused user and is logged in, and retransmits access to acquiring unit 1 and ask Seek information.
Specifically, MES system (Manufacturing Execution System, i.e. manufacturing execution system), is to be located at The management information system towards shop layer between the project management system on upper layer and the Industry Control of bottom, MES system can lead to It crosses information transmitting and management is optimized to the entire production process completed from order placement to product, MES system can be realized life The multiple functions such as scheduling, workshop document management, data acquisition, process engineering are produced, realize the collection to lathe in workshop Middle control;Acquiring unit 1, allocation unit 2 and authentication unit 3 in the present embodiment are controlled by MES system, in the present embodiment Extension software refers mainly to the two dimensions such as CAD, UG, Pro/Engineer, SolidWorks, three-dimensional graphics software, naturally it is also possible to be Other manufacture used software, meanwhile, the content to access is logged in the present embodiment using temporary visit number, not only It further include document and data under MES system unified management including above-mentioned software.
The accessing request information of user is obtained by acquiring unit 1, and the identity of user is identified, identification is completed Afterwards, it carries out operation by monitoring personnel to determine whether to agree to that the user accesses, however, it is determined that consenting user access passes through allocation unit 2 carry out the distribution of temporary visit number, and allocation unit 2 is distributed for the temporary visit number and accessed while distributing temporary visit Time limit and access authority, forming time limit information and authority information;User passes through verifying when logging in using temporary visit number first Unit 3 verifies temporary visit number, if the identity information of the temporary visit number is verified and login time is in access In limit, then it represents that meet login and require, user can login successfully, and be opened in corresponding access according to authority information to user Hold, required otherwise, it means that not meeting login, user can not log in, and send access request letter to acquiring unit 1 again simultaneously Breath waits acquiring unit 1 to redistribute temporary visit number;To user point in such a way that allocation unit 2 distributes temporary visit number It facilitates the management of account while can be used for multiple users with permission and safety is higher.
Embodiment two
The difference of the present embodiment and other embodiments is: as shown in Fig. 2, in the present embodiment, subscriber identity information packet Hierarchical information and work number information are included, allocation unit 2 includes: time limit distribution module 21, when for generation corresponding based on hierarchical information Limit information;Authority distribution module 22, for based on the corresponding generation authority information of hierarchical information;Identity distribution module 23 is used for base In the corresponding generation identity information of work number information;And generation module 24, it is used for timing information, authority information and work number information It arranges to form temporary visit number according to predetermined policy, and feeds back to user to be visited.
Hierarchical information represents the Permission Levels of the user, can distinguish in several ways, such as: digital section, word Female or alphabetical group, array monogram etc., hierarchical information is using the alphabetical group such as Aa, Ba, Bb, Ca, Cb in the present embodiment, equally , the forms such as digital section, letter or alphabetical group, array monogram can be used also to indicate in work number information, it is preferred that work The form of number information is different from hierarchical information, for example, the work number information in the present embodiment is made of digital section;
It is different according to the timing information of distribution corresponding to different hierarchical informations and authority information, system can be used Default setting, can also with someone's monitoring personnel operate select, distribution principle are as follows: higher grade, the power that can be assigned to Limit and time limit range are bigger, for authority information, the user of corresponding different hierarchical information, in the permission distributed Holding can also be different;Identity information can be consistent with work number information, can also increase corresponding mark on the basis of work number information Character string, or the serial number for formation;Authority information and timing information can be consistent with hierarchical information, or with other arrays Or letter group indicates that temporary visit number can be to arrange according to the sequence of authority information, timing information and identity information to be formed Array, or serial number is formed by based on the date, the corresponding temporary visit number generated and the authority information of distribution, time limit are believed Breath and identity information can be entered into MES system, and by logging in temporary visit number, MES system can recognize the temporary visit Timing information, authority information and identity information corresponding to number.
Authentication unit 3 includes: authentication module 31, for user identity to be read and identified according to identity information;Time limit Authentication module 32, for judging whether temporary visit number logs within the time limit according to timing information;And Authority Verification mould Block 33, for judging whether temporary visit number reaches access authority requirement according to authority information.
When being verified, whether time limit authentication module 32 judges temporary visit number within the time limit according to timing information It logs in, if login time exceeds time limit range, is then judged as that not meeting login requires, Authority Verification module 33 is according to authority information Judge whether temporary visit number reaches access authority requirement, if exceeding extent of competence, judgement does not meet visiting demand, Yong Huyao The content of access is in the lock state.
Further, it further includes locking module 4 that the user of the present embodiment, which accesses identifying system, and locking module 4, which is used to work as, faces When access number prescribe a time limit when reaching the corresponding access of timing information in access process, all access contents are locked, and to user It sends and re-requests dialog box, so that user is prompted to apply for temporary visit number again, meanwhile, locking module 4 is also used to interim Access number is unregistered processing.
Embodiment three
A kind of extension software users access recognition methods based on MES system, as shown in Figure 3, comprising:
501, MES system obtains accessing request information, and interim to user to be visited distribution one based on subscriber identity information Access number, temporary visit number include identity information, timing information and authority information.
Specifically, subscriber identity information includes hierarchical information and work number information, subscriber identity information is based on to use to be visited Family is distributed a temporary visit number and is specifically included: based on the corresponding generation timing information of hierarchical information and authority information, being believed based on work number Breath is corresponding to generate identity information;And timing information, authority information and work number information are arranged to be formed temporarily according to predetermined policy Access number, and feed back to user to be visited;Distribution principle are as follows: the time limit of the lower distribution of the level of user less, permission it is smaller, will Timing information, authority information and identity information can be integrally formed temporary visit number distribution to user.
502, user using temporary visit number log in when, MES system identify temporary visit number, and according to identity information, Timing information and authority information judge whether temporary visit number meets login and require, if meeting, allow to log in, and unlock permission The access content that information is included is refused to log in if not meeting, and retransmits accessing request information to MES system.
Judge whether temporary visit number meets login and require according to identity information, timing information and authority information specifically: User identity is read according to identity information, judges whether temporary visit number logs within the time limit according to timing information, foundation Authority information judges whether temporary visit number reaches access authority requirement;Wherein, if temporary visit number reaches in access process Timing information corresponding access time limit, MES system lock all access contents, and send to user and re-request dialog box, To prompt user to apply for temporary visit number again.
Further, when being accessed by temporary visit number, before carrying out data transmission, MES system will be to be passed Transmission of data carries out compression processing, transmits again after file is compressed so that transmission speed is faster, user when checking, Decompression opening is carried out again.
Further volume, MES system are also used to be unregistered temporary visit number processing, with facilitate to temporary visit number into Row control.
When user needs to access extension software and system file, accessing request information is sent to MES system first, due to The access account that each user uses is different, which represents the identity information of user, MES system, that is, basis The accessing request information of acquisition, monitoring personnel, which can carry out operating, at this time determines whether to agree to that the user accesses, however, it is determined that agrees to use Family access, MES system distribute a temporary visit number to the user, and are the temporary visit number distribution access time limit and access right Limit, forming time limit information and authority information;For user when being logged in using temporary visit number, MES system is first to temporary visit number It is verified, is required with determining whether the temporary visit number meets login, if the identity information of the temporary visit number is verified And login time is within the access time limit, then it represents that meets login and requires, user can login successfully, and MES system is believed according to permission It ceases to user and opens corresponding access content, required otherwise, it means that not meeting login, user can not log in, and simultaneously again Accessing request information is sent to MES system, MES system is waited to redistribute temporary visit number;Interim visit is distributed by MES system The mode of question mark distributes permission to user, while can use for multiple users, facilitates the management of account and safety It is higher.
In the above-described embodiments, it emphasizes particularly on different fields to the description of each embodiment, there is no the part being described in detail in some embodiment, Reference can be made to the related descriptions of other embodiments.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, certain steps sequentially or may be carried out simultaneously using other.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, the actions and modules being related to not necessarily this hair Necessary to bright.
In several embodiments provided herein, it should be understood that disclosed device, it can be real in other way It is existing.For example, the apparatus embodiments described above are merely exemplary, such as the division of said units, only one kind is patrolled Volume function division, there may be another division manner in actual implementation, such as multiple units or components can combine or can be with It is integrated into another system, or some features can be ignored or not executed.Another point, it is shown or discussed mutual Coupling or communication connection can be through some interfaces, and the indirect coupling or communication connection between device or unit can be electricity Letter or other forms.
Above-mentioned unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, and without limiting it;Although reference The present invention will be described in detail for previous embodiment, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of extension software users based on MES system access recognition methods characterized by comprising
MES system obtains accessing request information, and distributes a temporary visit number, institute to user to be visited based on subscriber identity information Stating temporary visit number includes identity information, timing information and authority information;And
When user is logged in using temporary visit number, MES system identifies the temporary visit number, and according to the identity information, The timing information and the authority information judge whether the temporary visit number meets login and require, if meeting, allow to step on Record, and unlock the access content that the authority information is included and refuse to log in if not meeting, and retransmitted to MES system Accessing request information.
2. the extension software users according to claim 1 based on MES system access recognition methods, which is characterized in that institute Stating subscriber identity information includes hierarchical information and work number information, and the subscriber identity information that is based on faces to user to be visited distribution one When access number specifically include:
Based on the corresponding generation timing information of the hierarchical information and authority information, based on the corresponding generation identity letter of the work number information Breath;And
It arranges the timing information, the authority information and the work number information to form the temporary visit according to predetermined policy Number, and feed back to user to be visited.
3. the extension software users according to claim 2 based on MES system access recognition methods, which is characterized in that institute It states and judges whether the temporary visit number meets login and want according to the identity information, the timing information and the authority information It asks specifically:
User identity is read according to the identity information, judges the temporary visit number whether in the time limit according to the timing information It is logged in range, judges whether the temporary visit number reaches access authority requirement according to the authority information.
4. the extension software users according to claim 3 based on MES system access recognition methods, which is characterized in that if The temporary visit number reaches the timing information corresponding access time limit in access process, and MES system will be in all access Hold locking, and is sent to user and re-request dialog box.
5. the extension software users according to claim 4 based on MES system access recognition methods, which is characterized in that logical When crossing the temporary visit number and accessing, before carrying out data transmission, MES system carries out data to be transmitted at compression Reason.
6. the extension software users according to claim 1 based on MES system access recognition methods, which is characterized in that institute MES system is stated to be also used to be unregistered processing to the temporary visit number.
7. a kind of extension software users based on MES system access identifying system characterized by comprising
Acquiring unit, for obtaining the accessing request information of user;
Allocation unit, for distributing a temporary visit number, the temporary visit number to user to be visited based on subscriber identity information Include identity information, timing information and authority information;And
Authentication unit, the temporary visit number for identification, and according to the identity information, the timing information and the permission Information judges whether the temporary visit number meets login and require;
When the temporary visit number, which meets login, to be required, the authentication unit allows user to log in, and unlocks the permission letter Included access content is ceased, when the temporary visit number, which does not meet login, to be required, the authentication unit refusal user is logged in, And accessing request information is retransmitted to the acquiring unit.
8. the extension software users according to claim 7 based on MES system access identifying system, which is characterized in that institute Stating subscriber identity information includes hierarchical information and work number information, and the allocation unit includes:
Time limit distribution module, for based on the corresponding generation timing information of the hierarchical information;
Authority distribution module, for based on the corresponding generation authority information of the hierarchical information;
Identity distribution module, for based on the corresponding generation identity information of the work number information;And
Generation module, for the timing information, the authority information and the work number information to be arranged shape according to predetermined policy At the temporary visit number, and feed back to user to be visited.
9. the extension software users according to claim 8 based on MES system access identifying system, which is characterized in that institute Stating authentication unit includes:
Authentication module, for user identity to be read and identified according to the identity information;
Time limit authentication module, for judging whether the temporary visit number logs within the time limit according to the timing information; And
Authority Verification module, for judging whether the temporary visit number reaches access authority requirement according to the authority information.
10. the extension software users according to claim 7 based on MES system access identifying system, which is characterized in that institute The system of stating further includes locking module, and the locking module is used to reach the time limit in access process when the temporary visit number It prescribes a time limit when the corresponding access of information, all access contents is locked, and sent to user and re-request dialog box.
CN201910183622.5A 2019-03-12 2019-03-12 The access recognition methods of extension software users and system based on MES system Pending CN109918932A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910183622.5A CN109918932A (en) 2019-03-12 2019-03-12 The access recognition methods of extension software users and system based on MES system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910183622.5A CN109918932A (en) 2019-03-12 2019-03-12 The access recognition methods of extension software users and system based on MES system

Publications (1)

Publication Number Publication Date
CN109918932A true CN109918932A (en) 2019-06-21

Family

ID=66964363

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910183622.5A Pending CN109918932A (en) 2019-03-12 2019-03-12 The access recognition methods of extension software users and system based on MES system

Country Status (1)

Country Link
CN (1) CN109918932A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625790A (en) * 2020-04-07 2020-09-04 青岛奥利普自动化控制系统有限公司 Electronic signature method and equipment based on MES system
CN113536365A (en) * 2021-06-07 2021-10-22 北京字跳网络技术有限公司 File access method, device, equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102103717A (en) * 2009-12-22 2011-06-22 西门子公司 Defining additional resources in a MES user management system
EP2747001A1 (en) * 2012-12-20 2014-06-25 Siemens Aktiengesellschaft A method and a system for granting an access to MES functionalities
CN104217145A (en) * 2013-05-30 2014-12-17 西门子公司 A method for restricting specific users from accessing predetermined portions of MES screens depending on the state of the web screen page
CN105429966A (en) * 2015-11-04 2016-03-23 浙江宇视科技有限公司 Method and system of client for obtaining control authority of peripheral front-end equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102103717A (en) * 2009-12-22 2011-06-22 西门子公司 Defining additional resources in a MES user management system
EP2747001A1 (en) * 2012-12-20 2014-06-25 Siemens Aktiengesellschaft A method and a system for granting an access to MES functionalities
CN104217145A (en) * 2013-05-30 2014-12-17 西门子公司 A method for restricting specific users from accessing predetermined portions of MES screens depending on the state of the web screen page
CN105429966A (en) * 2015-11-04 2016-03-23 浙江宇视科技有限公司 Method and system of client for obtaining control authority of peripheral front-end equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625790A (en) * 2020-04-07 2020-09-04 青岛奥利普自动化控制系统有限公司 Electronic signature method and equipment based on MES system
CN113536365A (en) * 2021-06-07 2021-10-22 北京字跳网络技术有限公司 File access method, device, equipment and medium
CN113536365B (en) * 2021-06-07 2022-10-28 北京字跳网络技术有限公司 File access method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN109729168B (en) Data sharing exchange system and method based on block chain
CN106790112B (en) Node operating system integrating lightweight block chains and data updating method
CN1860723B (en) System and methods providing enhanced security model
CN108632268A (en) The method for authenticating and device, storage medium, electronic device that block chain accesses
EP2245573B1 (en) Method for reading attributes from an id token
EP2304642B1 (en) Method for reading attributes from an id token
CN110401655A (en) Access control right management system based on user and role
CN105653315B (en) A kind of node operating system method for down loading based on block chain technology
CN110069908A (en) A kind of authority control method and device of block chain
CN110134674A (en) A kind of money and credit big data monitoring analysis system
CN112559627A (en) Alliance chain-based on-chain-under-chain collaborative electronic medical record data sharing method
CN106652109A (en) Intelligent lock control method, device and lock management server
CN109918932A (en) The access recognition methods of extension software users and system based on MES system
CN106586734A (en) Elevator remote debugging method, application terminal and debugging system
CN110474865A (en) Block chain user right system and implementation method
CN108322432A (en) A kind of mechanism application rights management method and service system based on tree-like tissue model
CN102984159A (en) Secure access logic control method based on terminal access behavior and platform server
CN108092945A (en) Definite method and apparatus, the terminal of access rights
CN107689949A (en) Data base authority management method and system
CN112905965B (en) Financial big data processing system based on block chain
CN108924115A (en) A kind of Simulation spatial service authority control method and system
CN110324350A (en) Identity identifying method and server based on the non-sensitive sensing data in mobile terminal
CN109587142A (en) A kind of the data safety AM access module and equipment of service-oriented stream
CN112199445A (en) Hierarchical structure of pyramidal block chain
DE102010010760B4 (en) A method of assigning a key to a subscriber device to be newly added to a wireless sensor-actuator network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190621

RJ01 Rejection of invention patent application after publication