CN111026798B - Electromechanical equipment database system and control method thereof - Google Patents
Electromechanical equipment database system and control method thereof Download PDFInfo
- Publication number
- CN111026798B CN111026798B CN201911235707.XA CN201911235707A CN111026798B CN 111026798 B CN111026798 B CN 111026798B CN 201911235707 A CN201911235707 A CN 201911235707A CN 111026798 B CN111026798 B CN 111026798B
- Authority
- CN
- China
- Prior art keywords
- login
- password
- cloud server
- verification
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/252—Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2365—Ensuring data consistency and integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/20—Administration of product repair or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/04—Manufacturing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Abstract
The invention provides an electromechanical equipment database system and a control method thereof, wherein the system comprises M clients connected with a cloud server, the j-th client comprises an information data acquisition input module, a data information display module, a controller and a network connection module, an information data output end of the information data acquisition input module is connected with an information data input end of the controller, a data information display output end of the controller is connected with a data information display input end of the data information display module, and a network connection end of the controller is connected with a network connection end of the network connection module; and the cloud server stores the electromechanical device database, and an operation user successfully logs in the cloud server through the client and then performs operation processing on the electromechanical device data on the cloud server. The invention can improve the management efficiency of the electromechanical equipment data.
Description
Technical Field
The invention relates to the technical field of databases, in particular to an electromechanical equipment database system and a control method thereof.
Background
Along with the acceleration of modern construction, industrialization rapid development, there are a large amount of mechanical equipment in the mill, the increase of equipment quantity also directly leads to the degree of difficulty of management to rise directly, electromechanical management system among the prior art relies on the manual work to go on, need extravagant a large amount of manpower and materials, moreover a large amount of personnel participate in the management and appear the mistake easily, and management efficiency is not high, can't make quick response to various emergency, influence production time, improved manufacturing cost, when carrying out operations such as purchase, data control, can only rely on experience, can't utilize the mill to manage in actual operation in-process data fast.
Disclosure of Invention
The invention aims at least solving the technical problems existing in the prior art, and particularly creatively provides an electromechanical equipment database system and a control method thereof.
In order to achieve the above object of the present invention, the present invention provides an electromechanical device database system, which includes M clients connected to a cloud server, where M is a positive integer greater than or equal to 1, and is a 1 st client, a 2 nd client, a 3 rd client, a … … th client, and an mth client, and the jth client includes an information data acquisition input module, a data information display module, a controller, and a network connection module, and j is a positive integer less than or equal to M; the information data output end of the information data acquisition input module is connected with the information data input end of the controller, the data information display output end of the controller is connected with the data information display input end of the data information display module, and the network connection end of the controller is connected with the network connection end of the network connection module;
and the cloud server stores the electromechanical device database, and an operation user successfully logs in the cloud server through the client and then performs operation processing on the electromechanical device data on the cloud server.
In a preferred embodiment of the present invention, the information data input module includes one or any combination of a keyboard unit, a mouse unit, an image acquisition unit, a fingerprint acquisition unit, and an rfid reader unit;
the information data output end of the keyboard unit is connected with the keyboard information data input end of the controller, the information data output end of the mouse unit is connected with the mouse information data input end of the controller, the image information data output end of the image acquisition unit is connected with the image information data input end of the controller, the information data output end of the fingerprint acquisition unit is connected with the fingerprint information data input end of the controller, and the information data output end of the rfid reader unit is connected with the rfid information data input end of the controller.
In a preferred embodiment of the invention, the image acquisition unit is a camera;
the data information display module is a touch display screen.
The invention also discloses a control method of the electromechanical equipment database system, which comprises the following steps:
s1, an operation user logs in a cloud server through a client;
s2, after the login of the operation user is successful, the data of the electromechanical equipment database is input;
s3, operating the user to inquire the integral data input into the electromechanical equipment database;
s4, outputting the selected data in a data table form.
The invention improves the management efficiency of the electromechanical equipment data and reduces the production cost.
In a preferred embodiment of the invention, in step S2, operating the user for data entry into the electromechanical device database comprises:
the cloud server acquires the authority of an operation user:
if the operation user is a common user, the cloud server stores temporarily the data input and stored by the common user; when the cloud server receives update and preservation of temporary storage data of an administrator user, the cloud server updates a database of the temporary storage data;
if the operation user is an administrator user, the cloud server updates the database of the data stored in the administrator user.
In a preferred embodiment of the invention, the input saved data comprises newly added entry data or/and modified entry data.
In a preferred embodiment of the invention, in step S3, the operating user querying the electromechanical device database comprises the steps of:
s61, grouping words of query words entered by an operation user; respectively A 1 、A 2 、A 3 、……、A n Wherein A is 1 Is the 1 st phrase, A 2 Is the 2 nd phrase, A 3 Is 3 rd phrase, A 4 Is the nth phrase;i is a positive integer less than or equal to n;
s62, for the ith phrase A i Hash operation is performed to obtain H (A) i ) H () is a hash function using MD5, and statistics H (a i ) Number of occurrences of single file content in database:
if it isIs greater than or equal to a preset statistical number, +.>Meaning the ith phrase A in the file name S i The number of occurrences after the hash operation; sequentially arranging and displaying the file names according to the sequence from the large number to the small number for selection by an operation user;
if it isAnd if the number is smaller than the preset statistics number, displaying the file name with the largest statistics number. The method and the device realize quick query of the data in the database and find the required content.
In a preferred embodiment of the present invention, in step S1, the login mode of the operating user includes one or any combination of the following operations:
operation one:
s11, a verification account number and a verification password are preset in a cloud server, and when logging in, a user is operated to input a login account number and a login password;
s12, mapping the input login account characters and login password characters with preset login account characters and login password characters one by one;
s13, carrying out hash operation on a preset login account corresponding to the input login account character to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s14, if the verification is passed, the login is successful;
and (2) operation II:
s21, a verification account number and a verification password are preset in a cloud server, and personal information of an operation user is stored in an rfid electronic tag, wherein the personal information of the operation user comprises an operation user ID;
s22, when the rfid reader-writer unit acquires personal information of an operation user stored in the rfid electronic tag during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s23, carrying out hash operation on the personal information of the operation user stored in the rfid electronic tag obtained by the rfid reader-writer unit to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s24, if the verification is passed, the login is successful;
and (3) operation three:
s31, a verification account number and a verification password are preset in a cloud server;
s32, when the fingerprint acquisition unit acquires the fingerprint of the operation user during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s33, carrying out hash operation on the fingerprint acquired by the fingerprint acquisition unit by the operation user to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s34, if the verification is passed, the login is successful;
operation four:
s41, a verification account number and a verification password are preset in a cloud server;
s42, when the image acquisition unit acquires the dynamic face of the operation user during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s43, carrying out hash operation on the dynamic face of the operation user acquired by the image acquisition unit to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s44, if the verification is passed, the login is successful.
And realizing the safe login of the operation user through the first operation, the second operation and the fourth operation.
In a preferred embodiment of the present invention, the following steps are included in step S13:
s131, let the number of errors q=0;
s132, the cloud server judges whether the obtained hash account number is consistent with a verification account number stored by the cloud server:
if the obtained hash account is consistent with the verification account stored by the cloud server, executing step S133;
if the obtained hash account is inconsistent with the verification account stored in the cloud server, prompting the user to input the login account and the login password again; q=q+1; step S134 is performed;
s133, the cloud server judges whether the obtained hash password is consistent with the verification password stored by the cloud server:
if the obtained hash password is consistent with the verification password stored by the cloud server, the verification login is successful; recording the IP and time of login;
if the obtained hash password is inconsistent with the verification password stored by the cloud server, prompting the user to input the login account and the login password again; q=q+1; step S134 is performed;
s134, if the error number Q is greater than or equal to the preset error number, locking the input login account, and prompting the user that the input login account error number reaches the preset number;
if the number of errors Q is less than the preset number of errors, the step S632 is returned;
the step S23 includes the steps of:
s231, let the number of errors q=0;
s232, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and re-acquiring the personal information of the operation user stored in the rfid electronic tag by the rfid reader unit; q=q+1; step S233 is performed;
s233, if the error number Q is greater than or equal to the preset error number, locking the personal information of the operation user stored in the rfid electronic tag by the rfid reader unit, and prompting the error number of the login password input by the operation user to reach the preset number;
if the number of errors Q is less than the preset number of errors, returning to step S232;
the step S33 includes the steps of:
s331, let the number of errors q=0;
s332, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, the verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and enabling the fingerprint acquisition unit to re-acquire the fingerprint of the operation user; q=q+1; step S333 is performed;
s333, if the error number Q is greater than or equal to the preset error number, locking the fingerprint of the operation user acquired by the fingerprint acquisition unit, and prompting the login password input by the operation user that the error number reaches the preset number;
if the number of errors Q is less than the preset number of errors, returning to step S332;
the step S43 includes the steps of:
s431, let the number of errors q=0;
s432, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, the verification login is successful; recording the IP and time of login; the logged-on IP and time are beneficial to operating users to know whether the login is carried out in the time period and the IP address, so that the login password can be modified in time.
If the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and enabling the image acquisition unit to re-acquire the dynamic face of the operation user; q=q+1; step S433 is performed;
s433, if the error number Q is greater than or equal to the preset error number, locking the dynamic face of the operation user acquired by the image acquisition unit, and prompting the login password error number input by the operation user to reach the preset number;
if the number of errors Q is less than the preset number of errors, the step S432 is returned. The login security of the operation user is enhanced.
In summary, by adopting the technical scheme, the management efficiency of the electromechanical device data can be improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
fig. 1 is a schematic block diagram of the connection of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
The invention provides an electromechanical equipment database system, which comprises M clients connected with a cloud server, wherein M is a positive integer greater than or equal to 1, and is respectively a 1 st client, a 2 nd client, a 3 rd client, … … and an Mth client, and a j-th client comprises an information data acquisition input module, a data information display module, a controller and a network connection module, and j is a positive integer less than or equal to M; the information data output end of the information data acquisition input module is connected with the information data input end of the controller, the data information display output end of the controller is connected with the data information display input end of the data information display module, and the network connection end of the controller is connected with the network connection end of the network connection module;
and the cloud server stores the electromechanical device database, and an operation user successfully logs in the cloud server through the client and then performs operation processing on the electromechanical device data on the cloud server.
In this embodiment, (1) the system may employ a conventional B/S network mechanism mode. Allowing access to the system for operation in an internal network environment. (2) And by adopting the permission control mode, each function of the system is independently controlled, the safety of data is improved, and the leakage of key data information is avoided. (3) data storage means: and a dual-machine hot standby mode is provided for database design, so that the problem of a storage system and the data loss are avoided. (4) an application server mechanism: and 2 servers are used for load balancing, so that the system can not be used when one server has a problem.
In a preferred embodiment of the present invention, the information data input module includes one or any combination of a keyboard unit, a mouse unit, an image acquisition unit, a fingerprint acquisition unit, and an rfid reader unit;
the information data output end of the keyboard unit is connected with the keyboard information data input end of the controller, the information data output end of the mouse unit is connected with the mouse information data input end of the controller, the image information data output end of the image acquisition unit is connected with the image information data input end of the controller, the information data output end of the fingerprint acquisition unit is connected with the fingerprint information data input end of the controller, and the information data output end of the rfid reader unit is connected with the rfid information data input end of the controller.
In a preferred embodiment of the invention, the image acquisition unit is a camera;
the data information display module is a touch display screen.
The invention also discloses a control method of the electromechanical equipment database system, as shown in figure 1, comprising the following steps:
s1, an operation user logs in a cloud server through a client;
s2, after the login of the operation user is successful, the data of the electromechanical equipment database is input;
s3, operating the user to inquire the integral data input into the electromechanical equipment database;
s4, outputting the selected data in a data table form. And screening the content which accords with the query result to form a new table, thereby outputting the content as an EXCEL report. The EXCEL report defaults to an EXCEL report showing all fields, but can also select part of the field outputs, and can be automatically combined into one item when the repeated items appear in the selected part of the fields.
In a preferred embodiment of the invention, in step S2, operating the user for data entry into the electromechanical device database comprises:
the cloud server acquires the authority of an operation user:
if the operation user is a common user, the cloud server stores temporarily the data input and stored by the common user; when the cloud server receives update and preservation of temporary storage data of an administrator user, the cloud server updates a database of the temporary storage data;
if the operation user is an administrator user, the cloud server updates the database of the data stored in the administrator user. In this embodiment, a database manager (manager user) can maintain a database in real time, and perform update operations such as modification, supplementation, deletion, and the like on existing data. The maintenance of other operators (common users) on the database needs to complete the data maintenance process, and after the auditing person passes, the auditing person can maintain the data for applying for maintenance.
The whole structure of the electromechanical equipment database is designed according to the track traffic industry, and the industry field can be added in front according to the actual situation when other industries are involved later, so that the structure of the database is properly adjusted. The electromechanical device database includes 20 fields of "specialty," "system," "subsystem," "device classification," "device name," "specification model," "technical parameter," "unit," "quantity," "unit price," "supplier," "contact address," "producer," "date quoted," "number of quotes," "item," "summary," "supply cycle," "remark," and the like. See table 1 for examples of electromechanical device database structures.
Table 1 electromechanical device database structure
In a preferred embodiment of the invention, the input saved data comprises newly added entry data or/and modified entry data.
In a preferred embodiment of the invention, in step S3, the operating user querying the electromechanical device database comprises the steps of:
s61, grouping words of query words entered by an operation user; respectively A 1 、A 2 、A 3 、……、A n Wherein A is 1 Is the 1 st phrase, A 2 Is the 2 nd phrase, A 3 Is 3 rd phrase, A 4 Is the nth phrase;i is a positive integer less than or equal to n, A is a query term;
s62, for the ith phrase A i Hash operation is performed to obtain H (A) i ) H () is a hash function using MD5, and statistics H (a i ) Number of occurrences of single file content in database:
if it isIs greater than or equal to a preset statistical number, +.>Meaning the ith phrase A in the file name S i The number of occurrences after the hash operation; sequentially arranging and displaying the file names according to the sequence from the large number to the small number for selection by an operation user;
if it isAnd if the number is smaller than the preset statistics number, displaying the file name with the largest statistics number.
In this embodiment, the method further includes fuzzy query, screening search and accurate search, wherein the fuzzy query: the query defaults to a fuzzy query, and a field can be regarded as the same as the query result as long as the field has the same point. Screening and searching: the partial fields can be screened for searching, and the query result can only display the screened partial fields, or can display all fields of the content of the compound screening query result. And (3) accurate searching: the partial fields can be screened for accurate query, and the screened fields of the query result must be identical to the input value.
In a preferred embodiment of the present invention, in step S1, the login mode of the operating user includes one or any combination of the following operations:
operation one:
s11, a verification account number and a verification password are preset in a cloud server, and when logging in, a user is operated to input a login account number and a login password;
s12, mapping the input login account characters and login password characters with preset login account characters and login password characters one by one; in this embodiment, taking the login account as an example, a general login account may be set according to the requirement of the user, for example, a mobile phone number, a mailbox, a nickname, etc., taking the login account as an example, if the mobile phone number of the user is 13987654321, the numbers 0 to 9 respectively correspond to preset characters in sequence, for example: character mapped to 0 is ")", character mapped to 1 is "|! "2" mapped characters "@",3 "mapped characters" # ", 4" mapped characters "blotting"% ", 5" mapped characters "%",6 "mapped characters" +", 7" mapped characters "&"% ", 8" mapped characters "%, the characters mapped by 9 are" (", the user mobile phone numbers 13987654321 are mapped into" | # (+%) and @ | ", then MD5 hash operation is carried out on" | # (+% > @ and @), and a hash account is obtained, and if the hash account is consistent with the verification account stored by the server, the account verification is passed.
S13, carrying out hash operation on a preset login account corresponding to the input login account character to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s14, if the verification is passed, the login is successful;
and (2) operation II:
s21, a verification account number and a verification password are preset in a cloud server, and personal information of an operation user is stored in an rfid electronic tag, wherein the personal information of the operation user comprises an operation user ID;
s22, when the rfid reader-writer unit acquires personal information of an operation user stored in the rfid electronic tag during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one; in this embodiment, the login password may be set according to the user's requirement, and if the login password set by the user is 13987654321, the numbers 0 to 9 thereof correspond to preset characters in sequence, for example: character mapped to 0 is ")", character mapped to 1 is "|! "2" character "@",3 "character" # ", 4" character "radial" ", 5" character "%",6 "character" ≡ "", 7 "", the character of the 8 map is ", the 9 mapped characters are" (", the login passwords 13987654321 are mapped into preset login password characters" |# (+%) and # @ | ". Ensure the security of the login passwords.
S23, carrying out hash operation on the personal information of the operation user stored in the rfid electronic tag obtained by the rfid reader-writer unit to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s24, if the verification is passed, the login is successful;
and (3) operation three:
s31, a verification account number and a verification password are preset in a cloud server;
s32, when the fingerprint acquisition unit acquires the fingerprint of the operation user during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s33, carrying out hash operation on the fingerprint acquired by the fingerprint acquisition unit by the operation user to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s34, if the verification is passed, the login is successful;
operation four:
s41, a verification account number and a verification password are preset in a cloud server;
s42, when the image acquisition unit acquires the dynamic face of the operation user during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s43, carrying out hash operation on the dynamic face of the operation user acquired by the image acquisition unit to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s44, if the verification is passed, the login is successful.
In a preferred embodiment of the present invention, the following steps are included in step S13:
s131, let the number of errors q=0;
s132, the cloud server judges whether the obtained hash account number is consistent with a verification account number stored by the cloud server:
if the obtained hash account is consistent with the verification account stored by the cloud server, executing step S133;
if the obtained hash account is inconsistent with the verification account stored in the cloud server, prompting the user to input the login account and the login password again; q=q+1; step S134 is performed;
s133, the cloud server judges whether the obtained hash password is consistent with the verification password stored by the cloud server:
if the obtained hash password is consistent with the verification password stored by the cloud server, the verification login is successful; recording the IP and time of login;
if the obtained hash password is inconsistent with the verification password stored by the cloud server, prompting the user to input the login account and the login password again; q=q+1; step S134 is performed;
s134, if the error number Q is greater than or equal to the preset error number, locking the input login account, and prompting the user that the input login account error number reaches the preset number;
if the number of errors Q is less than the preset number of errors, the step S632 is returned;
the step S23 includes the steps of:
s231, let the number of errors q=0;
s232, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and re-acquiring the personal information of the operation user stored in the rfid electronic tag by the rfid reader unit; q=q+1; step S233 is performed;
s233, if the error number Q is greater than or equal to the preset error number, locking the personal information of the operation user stored in the rfid electronic tag by the rfid reader unit, and prompting the error number of the login password input by the operation user to reach the preset number;
if the number of errors Q is less than the preset number of errors, returning to step S232;
the step S33 includes the steps of:
s331, let the number of errors q=0;
s332, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, the verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and enabling the fingerprint acquisition unit to re-acquire the fingerprint of the operation user; q=q+1; step S333 is performed;
s333, if the error number Q is greater than or equal to the preset error number, locking the fingerprint of the operation user acquired by the fingerprint acquisition unit, and prompting the login password input by the operation user that the error number reaches the preset number;
if the number of errors Q is less than the preset number of errors, returning to step S332;
the step S43 includes the steps of:
s431, let the number of errors q=0;
s432, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, the verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and enabling the image acquisition unit to re-acquire the dynamic face of the operation user; q=q+1; step S433 is performed;
s433, if the error number Q is greater than or equal to the preset error number, locking the dynamic face of the operation user acquired by the image acquisition unit, and prompting the login password error number input by the operation user to reach the preset number;
if the number of errors Q is less than the preset number of errors, the step S432 is returned.
In this embodiment, the system further includes background management, log management, flow management, task management, and visual graphical reporting.
And (3) background management: the main user of the background management end is a user with authority to view the 'background management' menu (for example, the user of the post of the system manager has the access authority of the 'background management' menu), and the main aspect is the configuration of various basic functions of the whole management platform, and the configuration mainly comprises the following steps: user management, menu management, post management, authority management, and the like. The user management realizes the management of the user information, namely the maintenance of the user login information. The password-modified password reset function has functions of user addition, deletion, modification, viewing, password modification, password reset and the like. Menu management realizes the new addition, deletion and modification of menus. The post manager allocates menu permissions based on posts while supporting associations between posts and users. And the post is added, deleted, modified and user associated. The authority management determines the menu access authority of the user, and the menu authority is distributed by the posts, wherein the corresponding relation between the posts and the menu is one-to-many relation.
And (3) log management: and (3) recording operations of database software such as adding, deleting, information maintenance, authority management and the like to form a log, wherein the log can be simply queried and exported, and only a database manager can access the log.
And (3) flow management: and the management flow is realized, and each operation application needs to make a set of corresponding approval flow. The general flow node types are: the initiation, audit, rechecking and check of maintenance (the initiation and check are only logic nodes and not actual operation nodes, the two nodes are unique and represent the start and the stop of a piece), the approval process can be flexibly configured (a new process is automatically provided with the process nodes of initiation and check), the maintenance content is in an editable state before the rechecking of maintenance matters is completed, and the maintenance content is locked and the rechecking is only performed for final data processing when the audit determines to enter the rechecking process.
And (3) task management: the method realizes the initiation of tasks and the reminding of auditing tasks, and can inquire historical tasks and auditing records.
Visual graphic report: and analyzing technical information and economic conditions of the equipment, providing graphic reports such as market price change, technical parameter change, profit change, market share of suppliers and the like of the equipment, realizing various report patterns such as a histogram, a pie chart, a line chart and the like, and assisting in analysis decision.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the invention, the scope of which is defined by the claims and their equivalents.
Claims (7)
1. The electromechanical equipment database system is characterized by comprising M clients connected with a cloud server, wherein M is a positive integer greater than or equal to 1, and is respectively a 1 st client, a 2 nd client, a 3 rd client, … … and an Mth client, and a j-th client comprises an information data acquisition input module, a data information display module, a controller and a network connection module, and j is a positive integer less than or equal to M; the information data output end of the information data acquisition input module is connected with the information data input end of the controller, the data information display output end of the controller is connected with the data information display input end of the data information display module, and the network connection end of the controller is connected with the network connection end of the network connection module;
the method comprises the steps that an electromechanical device database is stored on a cloud server, and operation processing is carried out on electromechanical device data on the cloud server after an operation user successfully logs in the cloud server through a client; the control method of the electromechanical equipment database system comprises the following steps:
s1, an operation user logs in a cloud server through a client;
s2, after the login of the operation user is successful, the data of the electromechanical equipment database is input;
s3, operating the user to inquire the integral data input into the electromechanical equipment database; the operation user querying the electromechanical device database comprises the following steps:
s61, grouping words of query words entered by an operation user; respectively A 1 、A 2 、A 3 、……、A n Wherein A is 1 Is the 1 st phrase, A 2 Is the 2 nd phrase, A 3 Is 3 rd phrase, A 4 Is the nth phrase;i is a positive integer less than or equal to n;
s62, for the ith phrase A i Hash operation is performed to obtain H (A) i ) H () is a hash function using MD5, and statistics H (a i ) Number of occurrences of single file content in database:
if it isIs greater than or equal to a preset statistical number, +.>Meaning the ith phrase A in the file name S i The number of occurrences after the hash operation; sequentially arranging and displaying the file names according to the sequence from the large number to the small number for selection by an operation user;
if it isIf the number of the file names is smaller than the preset statistics number, displaying the file name with the largest statistics value;
s4, outputting the selected data in a data table form.
2. The electromechanical device database system of claim 1, wherein the information data input module comprises one or any combination of a keyboard unit, a mouse unit, an image acquisition unit, a fingerprint acquisition unit, an rfid reader unit;
the information data output end of the keyboard unit is connected with the keyboard information data input end of the controller, the information data output end of the mouse unit is connected with the mouse information data input end of the controller, the image information data output end of the image acquisition unit is connected with the image information data input end of the controller, the information data output end of the fingerprint acquisition unit is connected with the fingerprint information data input end of the controller, and the information data output end of the rfid reader unit is connected with the rfid information data input end of the controller.
3. The electromechanical device database system according to claim 2, wherein the image acquisition unit is a camera;
the data information display module is a touch display screen.
4. The method of controlling a mechatronic device database system according to claim 1, characterized in that in step S2, operating the user to enter data into the mechatronic device database includes:
the cloud server acquires the authority of an operation user:
if the operation user is a common user, the cloud server stores temporarily the data input and stored by the common user; when the cloud server receives update and preservation of temporary storage data of an administrator user, the cloud server updates a database of the temporary storage data;
if the operation user is an administrator user, the cloud server updates the database of the data stored in the administrator user.
5. A method of controlling a database system of an electromechanical device according to claim 1, wherein the input stored data comprises newly added entry data or/and modified entry data.
6. The method of claim 1, wherein in step S1, the login mode of the operating user includes one or any combination of the following operations:
operation one:
s11, a verification account number and a verification password are preset in a cloud server, and when logging in, a user is operated to input a login account number and a login password;
s12, mapping the input login account characters and login password characters with preset login account characters and login password characters one by one;
s13, carrying out hash operation on a preset login account corresponding to the input login account character to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s14, if the verification is passed, the login is successful;
and (2) operation II:
s21, a verification account number and a verification password are preset in a cloud server, and personal information of an operation user is stored in an rfid electronic tag, wherein the personal information of the operation user comprises an operation user ID;
s22, when the rfid reader-writer unit acquires personal information of an operation user stored in the rfid electronic tag during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s23, carrying out hash operation on the personal information of the operation user stored in the rfid electronic tag obtained by the rfid reader-writer unit to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s24, if the verification is passed, the login is successful;
and (3) operation three:
s31, a verification account number and a verification password are preset in a cloud server;
s32, when the fingerprint acquisition unit acquires the fingerprint of the operation user during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s33, carrying out hash operation on the fingerprint acquired by the fingerprint acquisition unit by the operation user to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s34, if the verification is passed, the login is successful;
operation four:
s41, a verification account number and a verification password are preset in a cloud server;
s42, when the image acquisition unit acquires the dynamic face of the operation user during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s43, carrying out hash operation on the dynamic face of the operation user acquired by the image acquisition unit to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s44, if the verification is passed, the login is successful.
7. The method of controlling an electromechanical device database system according to claim 6, characterized by comprising the steps of, in step S13:
s131, let the number of errors q=0;
s132, the cloud server judges whether the obtained hash account number is consistent with a verification account number stored by the cloud server:
if the obtained hash account is consistent with the verification account stored by the cloud server, executing step S133;
if the obtained hash account is inconsistent with the verification account stored in the cloud server, prompting the user to input the login account and the login password again; q=q+1; step S134 is performed;
s133, the cloud server judges whether the obtained hash password is consistent with the verification password stored by the cloud server:
if the obtained hash password is consistent with the verification password stored by the cloud server, the verification login is successful; recording the IP and time of login;
if the obtained hash password is inconsistent with the verification password stored by the cloud server, prompting the user to input the login account and the login password again; q=q+1; step S134 is performed;
s134, if the error number Q is greater than or equal to the preset error number, locking the input login account, and prompting the user that the input login account error number reaches the preset number;
if the number of errors Q is less than the preset number of errors, the step S632 is returned;
the step S23 includes the steps of:
s231, let the number of errors q=0;
s232, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and re-acquiring the personal information of the operation user stored in the rfid electronic tag by the rfid reader unit; q=q+1; step S233 is performed;
s233, if the error number Q is greater than or equal to the preset error number, locking the personal information of the operation user stored in the rfid electronic tag by the rfid reader unit, and prompting the error number of the login password input by the operation user to reach the preset number;
if the number of errors Q is less than the preset number of errors, returning to step S232;
the step S33 includes the steps of:
s331, let the number of errors q=0;
s332, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, the verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and enabling the fingerprint acquisition unit to re-acquire the fingerprint of the operation user; q=q+1; step S333 is performed;
s333, if the error number Q is greater than or equal to the preset error number, locking the fingerprint of the operation user acquired by the fingerprint acquisition unit, and prompting the login password input by the operation user that the error number reaches the preset number;
if the number of errors Q is less than the preset number of errors, returning to step S332;
the step S43 includes the steps of:
s431, let the number of errors q=0;
s432, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, the verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and enabling the image acquisition unit to re-acquire the dynamic face of the operation user; q=q+1; step S433 is performed;
s433, if the error number Q is greater than or equal to the preset error number, locking the dynamic face of the operation user acquired by the image acquisition unit, and prompting the login password error number input by the operation user to reach the preset number;
if the number of errors Q is less than the preset number of errors, the step S432 is returned.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911235707.XA CN111026798B (en) | 2019-12-05 | 2019-12-05 | Electromechanical equipment database system and control method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911235707.XA CN111026798B (en) | 2019-12-05 | 2019-12-05 | Electromechanical equipment database system and control method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111026798A CN111026798A (en) | 2020-04-17 |
CN111026798B true CN111026798B (en) | 2023-07-14 |
Family
ID=70204376
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911235707.XA Active CN111026798B (en) | 2019-12-05 | 2019-12-05 | Electromechanical equipment database system and control method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111026798B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111708658A (en) * | 2020-06-09 | 2020-09-25 | 孟磊 | Judicial-assisted case data risk management system and application method thereof |
CN112100654A (en) * | 2020-09-02 | 2020-12-18 | 军事科学院系统工程研究院网络信息研究所 | Terminal-based equipment database resource management method |
CN112464192A (en) * | 2020-10-26 | 2021-03-09 | 国网安徽省电力有限公司信息通信分公司 | Power grid data asset management system based on big data |
CN112783870A (en) * | 2021-02-28 | 2021-05-11 | 乔健 | Cloud data synchronization system and method for local real-time transitional storage |
CN113179246B (en) * | 2021-03-19 | 2022-08-26 | 重庆扬成大数据科技有限公司 | Working method for carrying out government affair data fusion safety through four-in-one network |
CN113162916B (en) * | 2021-03-19 | 2022-09-09 | 重庆扬成大数据科技有限公司 | Working method for executing smart city operation instruction through big data platform |
CN113312536B (en) * | 2021-05-28 | 2022-11-08 | 中铁十一局集团第五工程有限公司 | Engineering survey intelligent management control platform |
CN113312535B (en) * | 2021-05-28 | 2023-02-24 | 中铁十一局集团第五工程有限公司 | Engineering survey intelligent management control cloud platform |
CN113793196A (en) * | 2021-08-31 | 2021-12-14 | 宁夏百川电力股份有限公司 | Electricity doctor sells electricity management system based on cloud calculates |
CN113656790A (en) * | 2021-08-31 | 2021-11-16 | 重庆长风化学工业有限公司 | Control method for generating phosgene platform system |
CN114553528B (en) * | 2022-02-22 | 2024-04-19 | 成都睿智兴华信息技术有限公司 | Internal and external network data safety transmission system and transmission method thereof |
CN115022349A (en) * | 2022-06-07 | 2022-09-06 | 杭州爱软测信息技术有限公司 | Cloud storage file access control system based on address service |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103095829A (en) * | 2013-01-15 | 2013-05-08 | 上海交通大学 | Network contact list system achieving version management and authority management |
US20190034646A1 (en) * | 2016-03-28 | 2019-01-31 | Hitachi, Ltd. | Database system and data retrieval method |
CN110493197A (en) * | 2019-07-25 | 2019-11-22 | 深圳壹账通智能科技有限公司 | A kind of login process method and relevant device |
-
2019
- 2019-12-05 CN CN201911235707.XA patent/CN111026798B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103095829A (en) * | 2013-01-15 | 2013-05-08 | 上海交通大学 | Network contact list system achieving version management and authority management |
US20190034646A1 (en) * | 2016-03-28 | 2019-01-31 | Hitachi, Ltd. | Database system and data retrieval method |
CN110493197A (en) * | 2019-07-25 | 2019-11-22 | 深圳壹账通智能科技有限公司 | A kind of login process method and relevant device |
Also Published As
Publication number | Publication date |
---|---|
CN111026798A (en) | 2020-04-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111026798B (en) | Electromechanical equipment database system and control method thereof | |
US9679038B2 (en) | Systems and methods for construction field management and operations with building information modeling | |
US7640165B2 (en) | Web based methods and systems for managing compliance assurance information | |
US8131560B2 (en) | Systems and methods for managing regulatory information | |
CN110210775B (en) | Information management platform, application and method thereof | |
CN108898317B (en) | Method for respectively authorizing form operation authority according to form field values | |
CN108574620A (en) | A kind of data subscription method, device, server and system | |
CN108920914B (en) | Authority control method and device | |
JP5824732B2 (en) | Employee information management system, information processing apparatus, employee information management system generation method, employee information management system generation program, and information acquisition method | |
US7840010B2 (en) | Interactive security control system with conflict checking | |
CN109961264A (en) | A kind of enterprise information management system and management method | |
CN113592680A (en) | Service platform based on regional education big data | |
US20070208698A1 (en) | Avoiding duplicate service requests | |
CN111274464A (en) | Knowledge management system | |
US20030004988A1 (en) | Drawings data mangement system, method and program | |
CN115344888A (en) | Data access method and device, electronic equipment and storage medium | |
CN115082036A (en) | Data management method and device, electronic equipment and storage medium | |
US10430413B2 (en) | Data information framework | |
US20060268758A1 (en) | Interactive security control system with audit capabilities | |
CN110728567A (en) | Electronic invoice reimbursement management system and method | |
CN109829841A (en) | A kind of design method of government procurement evaluation expert management system | |
US20180293681A1 (en) | Automated background checks | |
CN109670728B (en) | Ship design quality information management system based on database | |
CN111047301A (en) | Spacecraft development process management system and method | |
US20040044540A1 (en) | Distributed environmental health & safety data collection and reporting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 214104 room 301-218, block a, Xidong chuangrong building, No. 78, Danshan Road, anzhen street, Xishan District, Wuxi City, Jiangsu Province Applicant after: Jiangsu CRRC Urban Development Co.,Ltd. Applicant after: CRRC CONSTRUCTION ENGINEERING Co.,Ltd. Address before: 215000 NO.115 Yinsheng Road, Shengpu Town, Suzhou Industrial Park, Jiangsu Province Applicant before: SUZHOU CHINA VEHICLE CONSTRUCTION ENGINEERING Co.,Ltd. Applicant before: CRRC CONSTRUCTION ENGINEERING Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |