CN111026798B - Electromechanical equipment database system and control method thereof - Google Patents

Electromechanical equipment database system and control method thereof Download PDF

Info

Publication number
CN111026798B
CN111026798B CN201911235707.XA CN201911235707A CN111026798B CN 111026798 B CN111026798 B CN 111026798B CN 201911235707 A CN201911235707 A CN 201911235707A CN 111026798 B CN111026798 B CN 111026798B
Authority
CN
China
Prior art keywords
login
password
cloud server
verification
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911235707.XA
Other languages
Chinese (zh)
Other versions
CN111026798A (en
Inventor
陶礼斌
胡金杰
张民才
王猛
关侠
张正忠
宋栋梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CRRC Construction Engineering Co Ltd
Jiangsu CRRC Urban Development Co Ltd
Original Assignee
CRRC Construction Engineering Co Ltd
Jiangsu CRRC Urban Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CRRC Construction Engineering Co Ltd, Jiangsu CRRC Urban Development Co Ltd filed Critical CRRC Construction Engineering Co Ltd
Priority to CN201911235707.XA priority Critical patent/CN111026798B/en
Publication of CN111026798A publication Critical patent/CN111026798A/en
Application granted granted Critical
Publication of CN111026798B publication Critical patent/CN111026798B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/04Manufacturing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The invention provides an electromechanical equipment database system and a control method thereof, wherein the system comprises M clients connected with a cloud server, the j-th client comprises an information data acquisition input module, a data information display module, a controller and a network connection module, an information data output end of the information data acquisition input module is connected with an information data input end of the controller, a data information display output end of the controller is connected with a data information display input end of the data information display module, and a network connection end of the controller is connected with a network connection end of the network connection module; and the cloud server stores the electromechanical device database, and an operation user successfully logs in the cloud server through the client and then performs operation processing on the electromechanical device data on the cloud server. The invention can improve the management efficiency of the electromechanical equipment data.

Description

Electromechanical equipment database system and control method thereof
Technical Field
The invention relates to the technical field of databases, in particular to an electromechanical equipment database system and a control method thereof.
Background
Along with the acceleration of modern construction, industrialization rapid development, there are a large amount of mechanical equipment in the mill, the increase of equipment quantity also directly leads to the degree of difficulty of management to rise directly, electromechanical management system among the prior art relies on the manual work to go on, need extravagant a large amount of manpower and materials, moreover a large amount of personnel participate in the management and appear the mistake easily, and management efficiency is not high, can't make quick response to various emergency, influence production time, improved manufacturing cost, when carrying out operations such as purchase, data control, can only rely on experience, can't utilize the mill to manage in actual operation in-process data fast.
Disclosure of Invention
The invention aims at least solving the technical problems existing in the prior art, and particularly creatively provides an electromechanical equipment database system and a control method thereof.
In order to achieve the above object of the present invention, the present invention provides an electromechanical device database system, which includes M clients connected to a cloud server, where M is a positive integer greater than or equal to 1, and is a 1 st client, a 2 nd client, a 3 rd client, a … … th client, and an mth client, and the jth client includes an information data acquisition input module, a data information display module, a controller, and a network connection module, and j is a positive integer less than or equal to M; the information data output end of the information data acquisition input module is connected with the information data input end of the controller, the data information display output end of the controller is connected with the data information display input end of the data information display module, and the network connection end of the controller is connected with the network connection end of the network connection module;
and the cloud server stores the electromechanical device database, and an operation user successfully logs in the cloud server through the client and then performs operation processing on the electromechanical device data on the cloud server.
In a preferred embodiment of the present invention, the information data input module includes one or any combination of a keyboard unit, a mouse unit, an image acquisition unit, a fingerprint acquisition unit, and an rfid reader unit;
the information data output end of the keyboard unit is connected with the keyboard information data input end of the controller, the information data output end of the mouse unit is connected with the mouse information data input end of the controller, the image information data output end of the image acquisition unit is connected with the image information data input end of the controller, the information data output end of the fingerprint acquisition unit is connected with the fingerprint information data input end of the controller, and the information data output end of the rfid reader unit is connected with the rfid information data input end of the controller.
In a preferred embodiment of the invention, the image acquisition unit is a camera;
the data information display module is a touch display screen.
The invention also discloses a control method of the electromechanical equipment database system, which comprises the following steps:
s1, an operation user logs in a cloud server through a client;
s2, after the login of the operation user is successful, the data of the electromechanical equipment database is input;
s3, operating the user to inquire the integral data input into the electromechanical equipment database;
s4, outputting the selected data in a data table form.
The invention improves the management efficiency of the electromechanical equipment data and reduces the production cost.
In a preferred embodiment of the invention, in step S2, operating the user for data entry into the electromechanical device database comprises:
the cloud server acquires the authority of an operation user:
if the operation user is a common user, the cloud server stores temporarily the data input and stored by the common user; when the cloud server receives update and preservation of temporary storage data of an administrator user, the cloud server updates a database of the temporary storage data;
if the operation user is an administrator user, the cloud server updates the database of the data stored in the administrator user.
In a preferred embodiment of the invention, the input saved data comprises newly added entry data or/and modified entry data.
In a preferred embodiment of the invention, in step S3, the operating user querying the electromechanical device database comprises the steps of:
s61, grouping words of query words entered by an operation user; respectively A 1 、A 2 、A 3 、……、A n Wherein A is 1 Is the 1 st phrase, A 2 Is the 2 nd phrase, A 3 Is 3 rd phrase, A 4 Is the nth phrase;
Figure BDA0002304825020000031
i is a positive integer less than or equal to n;
s62, for the ith phrase A i Hash operation is performed to obtain H (A) i ) H () is a hash function using MD5, and statistics H (a i ) Number of occurrences of single file content in database:
if it is
Figure BDA0002304825020000032
Is greater than or equal to a preset statistical number, +.>
Figure BDA0002304825020000033
Meaning the ith phrase A in the file name S i The number of occurrences after the hash operation; sequentially arranging and displaying the file names according to the sequence from the large number to the small number for selection by an operation user;
if it is
Figure BDA0002304825020000034
And if the number is smaller than the preset statistics number, displaying the file name with the largest statistics number. The method and the device realize quick query of the data in the database and find the required content.
In a preferred embodiment of the present invention, in step S1, the login mode of the operating user includes one or any combination of the following operations:
operation one:
s11, a verification account number and a verification password are preset in a cloud server, and when logging in, a user is operated to input a login account number and a login password;
s12, mapping the input login account characters and login password characters with preset login account characters and login password characters one by one;
s13, carrying out hash operation on a preset login account corresponding to the input login account character to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s14, if the verification is passed, the login is successful;
and (2) operation II:
s21, a verification account number and a verification password are preset in a cloud server, and personal information of an operation user is stored in an rfid electronic tag, wherein the personal information of the operation user comprises an operation user ID;
s22, when the rfid reader-writer unit acquires personal information of an operation user stored in the rfid electronic tag during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s23, carrying out hash operation on the personal information of the operation user stored in the rfid electronic tag obtained by the rfid reader-writer unit to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s24, if the verification is passed, the login is successful;
and (3) operation three:
s31, a verification account number and a verification password are preset in a cloud server;
s32, when the fingerprint acquisition unit acquires the fingerprint of the operation user during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s33, carrying out hash operation on the fingerprint acquired by the fingerprint acquisition unit by the operation user to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s34, if the verification is passed, the login is successful;
operation four:
s41, a verification account number and a verification password are preset in a cloud server;
s42, when the image acquisition unit acquires the dynamic face of the operation user during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s43, carrying out hash operation on the dynamic face of the operation user acquired by the image acquisition unit to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s44, if the verification is passed, the login is successful.
And realizing the safe login of the operation user through the first operation, the second operation and the fourth operation.
In a preferred embodiment of the present invention, the following steps are included in step S13:
s131, let the number of errors q=0;
s132, the cloud server judges whether the obtained hash account number is consistent with a verification account number stored by the cloud server:
if the obtained hash account is consistent with the verification account stored by the cloud server, executing step S133;
if the obtained hash account is inconsistent with the verification account stored in the cloud server, prompting the user to input the login account and the login password again; q=q+1; step S134 is performed;
s133, the cloud server judges whether the obtained hash password is consistent with the verification password stored by the cloud server:
if the obtained hash password is consistent with the verification password stored by the cloud server, the verification login is successful; recording the IP and time of login;
if the obtained hash password is inconsistent with the verification password stored by the cloud server, prompting the user to input the login account and the login password again; q=q+1; step S134 is performed;
s134, if the error number Q is greater than or equal to the preset error number, locking the input login account, and prompting the user that the input login account error number reaches the preset number;
if the number of errors Q is less than the preset number of errors, the step S632 is returned;
the step S23 includes the steps of:
s231, let the number of errors q=0;
s232, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and re-acquiring the personal information of the operation user stored in the rfid electronic tag by the rfid reader unit; q=q+1; step S233 is performed;
s233, if the error number Q is greater than or equal to the preset error number, locking the personal information of the operation user stored in the rfid electronic tag by the rfid reader unit, and prompting the error number of the login password input by the operation user to reach the preset number;
if the number of errors Q is less than the preset number of errors, returning to step S232;
the step S33 includes the steps of:
s331, let the number of errors q=0;
s332, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, the verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and enabling the fingerprint acquisition unit to re-acquire the fingerprint of the operation user; q=q+1; step S333 is performed;
s333, if the error number Q is greater than or equal to the preset error number, locking the fingerprint of the operation user acquired by the fingerprint acquisition unit, and prompting the login password input by the operation user that the error number reaches the preset number;
if the number of errors Q is less than the preset number of errors, returning to step S332;
the step S43 includes the steps of:
s431, let the number of errors q=0;
s432, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, the verification login is successful; recording the IP and time of login; the logged-on IP and time are beneficial to operating users to know whether the login is carried out in the time period and the IP address, so that the login password can be modified in time.
If the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and enabling the image acquisition unit to re-acquire the dynamic face of the operation user; q=q+1; step S433 is performed;
s433, if the error number Q is greater than or equal to the preset error number, locking the dynamic face of the operation user acquired by the image acquisition unit, and prompting the login password error number input by the operation user to reach the preset number;
if the number of errors Q is less than the preset number of errors, the step S432 is returned. The login security of the operation user is enhanced.
In summary, by adopting the technical scheme, the management efficiency of the electromechanical device data can be improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
fig. 1 is a schematic block diagram of the connection of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
The invention provides an electromechanical equipment database system, which comprises M clients connected with a cloud server, wherein M is a positive integer greater than or equal to 1, and is respectively a 1 st client, a 2 nd client, a 3 rd client, … … and an Mth client, and a j-th client comprises an information data acquisition input module, a data information display module, a controller and a network connection module, and j is a positive integer less than or equal to M; the information data output end of the information data acquisition input module is connected with the information data input end of the controller, the data information display output end of the controller is connected with the data information display input end of the data information display module, and the network connection end of the controller is connected with the network connection end of the network connection module;
and the cloud server stores the electromechanical device database, and an operation user successfully logs in the cloud server through the client and then performs operation processing on the electromechanical device data on the cloud server.
In this embodiment, (1) the system may employ a conventional B/S network mechanism mode. Allowing access to the system for operation in an internal network environment. (2) And by adopting the permission control mode, each function of the system is independently controlled, the safety of data is improved, and the leakage of key data information is avoided. (3) data storage means: and a dual-machine hot standby mode is provided for database design, so that the problem of a storage system and the data loss are avoided. (4) an application server mechanism: and 2 servers are used for load balancing, so that the system can not be used when one server has a problem.
In a preferred embodiment of the present invention, the information data input module includes one or any combination of a keyboard unit, a mouse unit, an image acquisition unit, a fingerprint acquisition unit, and an rfid reader unit;
the information data output end of the keyboard unit is connected with the keyboard information data input end of the controller, the information data output end of the mouse unit is connected with the mouse information data input end of the controller, the image information data output end of the image acquisition unit is connected with the image information data input end of the controller, the information data output end of the fingerprint acquisition unit is connected with the fingerprint information data input end of the controller, and the information data output end of the rfid reader unit is connected with the rfid information data input end of the controller.
In a preferred embodiment of the invention, the image acquisition unit is a camera;
the data information display module is a touch display screen.
The invention also discloses a control method of the electromechanical equipment database system, as shown in figure 1, comprising the following steps:
s1, an operation user logs in a cloud server through a client;
s2, after the login of the operation user is successful, the data of the electromechanical equipment database is input;
s3, operating the user to inquire the integral data input into the electromechanical equipment database;
s4, outputting the selected data in a data table form. And screening the content which accords with the query result to form a new table, thereby outputting the content as an EXCEL report. The EXCEL report defaults to an EXCEL report showing all fields, but can also select part of the field outputs, and can be automatically combined into one item when the repeated items appear in the selected part of the fields.
In a preferred embodiment of the invention, in step S2, operating the user for data entry into the electromechanical device database comprises:
the cloud server acquires the authority of an operation user:
if the operation user is a common user, the cloud server stores temporarily the data input and stored by the common user; when the cloud server receives update and preservation of temporary storage data of an administrator user, the cloud server updates a database of the temporary storage data;
if the operation user is an administrator user, the cloud server updates the database of the data stored in the administrator user. In this embodiment, a database manager (manager user) can maintain a database in real time, and perform update operations such as modification, supplementation, deletion, and the like on existing data. The maintenance of other operators (common users) on the database needs to complete the data maintenance process, and after the auditing person passes, the auditing person can maintain the data for applying for maintenance.
The whole structure of the electromechanical equipment database is designed according to the track traffic industry, and the industry field can be added in front according to the actual situation when other industries are involved later, so that the structure of the database is properly adjusted. The electromechanical device database includes 20 fields of "specialty," "system," "subsystem," "device classification," "device name," "specification model," "technical parameter," "unit," "quantity," "unit price," "supplier," "contact address," "producer," "date quoted," "number of quotes," "item," "summary," "supply cycle," "remark," and the like. See table 1 for examples of electromechanical device database structures.
Table 1 electromechanical device database structure
Figure BDA0002304825020000101
In a preferred embodiment of the invention, the input saved data comprises newly added entry data or/and modified entry data.
In a preferred embodiment of the invention, in step S3, the operating user querying the electromechanical device database comprises the steps of:
s61, grouping words of query words entered by an operation user; respectively A 1 、A 2 、A 3 、……、A n Wherein A is 1 Is the 1 st phrase, A 2 Is the 2 nd phrase, A 3 Is 3 rd phrase, A 4 Is the nth phrase;
Figure BDA0002304825020000102
i is a positive integer less than or equal to n, A is a query term;
s62, for the ith phrase A i Hash operation is performed to obtain H (A) i ) H () is a hash function using MD5, and statistics H (a i ) Number of occurrences of single file content in database:
if it is
Figure BDA0002304825020000111
Is greater than or equal to a preset statistical number, +.>
Figure BDA0002304825020000112
Meaning the ith phrase A in the file name S i The number of occurrences after the hash operation; sequentially arranging and displaying the file names according to the sequence from the large number to the small number for selection by an operation user;
if it is
Figure BDA0002304825020000113
And if the number is smaller than the preset statistics number, displaying the file name with the largest statistics number.
In this embodiment, the method further includes fuzzy query, screening search and accurate search, wherein the fuzzy query: the query defaults to a fuzzy query, and a field can be regarded as the same as the query result as long as the field has the same point. Screening and searching: the partial fields can be screened for searching, and the query result can only display the screened partial fields, or can display all fields of the content of the compound screening query result. And (3) accurate searching: the partial fields can be screened for accurate query, and the screened fields of the query result must be identical to the input value.
In a preferred embodiment of the present invention, in step S1, the login mode of the operating user includes one or any combination of the following operations:
operation one:
s11, a verification account number and a verification password are preset in a cloud server, and when logging in, a user is operated to input a login account number and a login password;
s12, mapping the input login account characters and login password characters with preset login account characters and login password characters one by one; in this embodiment, taking the login account as an example, a general login account may be set according to the requirement of the user, for example, a mobile phone number, a mailbox, a nickname, etc., taking the login account as an example, if the mobile phone number of the user is 13987654321, the numbers 0 to 9 respectively correspond to preset characters in sequence, for example: character mapped to 0 is ")", character mapped to 1 is "|! "2" mapped characters "@",3 "mapped characters" # ", 4" mapped characters "blotting"% ", 5" mapped characters "%",6 "mapped characters" +", 7" mapped characters "&"% ", 8" mapped characters "%, the characters mapped by 9 are" (", the user mobile phone numbers 13987654321 are mapped into" | # (+%) and @ | ", then MD5 hash operation is carried out on" | # (+% > @ and @), and a hash account is obtained, and if the hash account is consistent with the verification account stored by the server, the account verification is passed.
S13, carrying out hash operation on a preset login account corresponding to the input login account character to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s14, if the verification is passed, the login is successful;
and (2) operation II:
s21, a verification account number and a verification password are preset in a cloud server, and personal information of an operation user is stored in an rfid electronic tag, wherein the personal information of the operation user comprises an operation user ID;
s22, when the rfid reader-writer unit acquires personal information of an operation user stored in the rfid electronic tag during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one; in this embodiment, the login password may be set according to the user's requirement, and if the login password set by the user is 13987654321, the numbers 0 to 9 thereof correspond to preset characters in sequence, for example: character mapped to 0 is ")", character mapped to 1 is "|! "2" character "@",3 "character" # ", 4" character "radial" ", 5" character "%",6 "character" ≡ "", 7 "", the character of the 8 map is ", the 9 mapped characters are" (", the login passwords 13987654321 are mapped into preset login password characters" |# (+%) and # @ | ". Ensure the security of the login passwords.
S23, carrying out hash operation on the personal information of the operation user stored in the rfid electronic tag obtained by the rfid reader-writer unit to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s24, if the verification is passed, the login is successful;
and (3) operation three:
s31, a verification account number and a verification password are preset in a cloud server;
s32, when the fingerprint acquisition unit acquires the fingerprint of the operation user during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s33, carrying out hash operation on the fingerprint acquired by the fingerprint acquisition unit by the operation user to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s34, if the verification is passed, the login is successful;
operation four:
s41, a verification account number and a verification password are preset in a cloud server;
s42, when the image acquisition unit acquires the dynamic face of the operation user during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s43, carrying out hash operation on the dynamic face of the operation user acquired by the image acquisition unit to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s44, if the verification is passed, the login is successful.
In a preferred embodiment of the present invention, the following steps are included in step S13:
s131, let the number of errors q=0;
s132, the cloud server judges whether the obtained hash account number is consistent with a verification account number stored by the cloud server:
if the obtained hash account is consistent with the verification account stored by the cloud server, executing step S133;
if the obtained hash account is inconsistent with the verification account stored in the cloud server, prompting the user to input the login account and the login password again; q=q+1; step S134 is performed;
s133, the cloud server judges whether the obtained hash password is consistent with the verification password stored by the cloud server:
if the obtained hash password is consistent with the verification password stored by the cloud server, the verification login is successful; recording the IP and time of login;
if the obtained hash password is inconsistent with the verification password stored by the cloud server, prompting the user to input the login account and the login password again; q=q+1; step S134 is performed;
s134, if the error number Q is greater than or equal to the preset error number, locking the input login account, and prompting the user that the input login account error number reaches the preset number;
if the number of errors Q is less than the preset number of errors, the step S632 is returned;
the step S23 includes the steps of:
s231, let the number of errors q=0;
s232, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and re-acquiring the personal information of the operation user stored in the rfid electronic tag by the rfid reader unit; q=q+1; step S233 is performed;
s233, if the error number Q is greater than or equal to the preset error number, locking the personal information of the operation user stored in the rfid electronic tag by the rfid reader unit, and prompting the error number of the login password input by the operation user to reach the preset number;
if the number of errors Q is less than the preset number of errors, returning to step S232;
the step S33 includes the steps of:
s331, let the number of errors q=0;
s332, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, the verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and enabling the fingerprint acquisition unit to re-acquire the fingerprint of the operation user; q=q+1; step S333 is performed;
s333, if the error number Q is greater than or equal to the preset error number, locking the fingerprint of the operation user acquired by the fingerprint acquisition unit, and prompting the login password input by the operation user that the error number reaches the preset number;
if the number of errors Q is less than the preset number of errors, returning to step S332;
the step S43 includes the steps of:
s431, let the number of errors q=0;
s432, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, the verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and enabling the image acquisition unit to re-acquire the dynamic face of the operation user; q=q+1; step S433 is performed;
s433, if the error number Q is greater than or equal to the preset error number, locking the dynamic face of the operation user acquired by the image acquisition unit, and prompting the login password error number input by the operation user to reach the preset number;
if the number of errors Q is less than the preset number of errors, the step S432 is returned.
In this embodiment, the system further includes background management, log management, flow management, task management, and visual graphical reporting.
And (3) background management: the main user of the background management end is a user with authority to view the 'background management' menu (for example, the user of the post of the system manager has the access authority of the 'background management' menu), and the main aspect is the configuration of various basic functions of the whole management platform, and the configuration mainly comprises the following steps: user management, menu management, post management, authority management, and the like. The user management realizes the management of the user information, namely the maintenance of the user login information. The password-modified password reset function has functions of user addition, deletion, modification, viewing, password modification, password reset and the like. Menu management realizes the new addition, deletion and modification of menus. The post manager allocates menu permissions based on posts while supporting associations between posts and users. And the post is added, deleted, modified and user associated. The authority management determines the menu access authority of the user, and the menu authority is distributed by the posts, wherein the corresponding relation between the posts and the menu is one-to-many relation.
And (3) log management: and (3) recording operations of database software such as adding, deleting, information maintenance, authority management and the like to form a log, wherein the log can be simply queried and exported, and only a database manager can access the log.
And (3) flow management: and the management flow is realized, and each operation application needs to make a set of corresponding approval flow. The general flow node types are: the initiation, audit, rechecking and check of maintenance (the initiation and check are only logic nodes and not actual operation nodes, the two nodes are unique and represent the start and the stop of a piece), the approval process can be flexibly configured (a new process is automatically provided with the process nodes of initiation and check), the maintenance content is in an editable state before the rechecking of maintenance matters is completed, and the maintenance content is locked and the rechecking is only performed for final data processing when the audit determines to enter the rechecking process.
And (3) task management: the method realizes the initiation of tasks and the reminding of auditing tasks, and can inquire historical tasks and auditing records.
Visual graphic report: and analyzing technical information and economic conditions of the equipment, providing graphic reports such as market price change, technical parameter change, profit change, market share of suppliers and the like of the equipment, realizing various report patterns such as a histogram, a pie chart, a line chart and the like, and assisting in analysis decision.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the invention, the scope of which is defined by the claims and their equivalents.

Claims (7)

1. The electromechanical equipment database system is characterized by comprising M clients connected with a cloud server, wherein M is a positive integer greater than or equal to 1, and is respectively a 1 st client, a 2 nd client, a 3 rd client, … … and an Mth client, and a j-th client comprises an information data acquisition input module, a data information display module, a controller and a network connection module, and j is a positive integer less than or equal to M; the information data output end of the information data acquisition input module is connected with the information data input end of the controller, the data information display output end of the controller is connected with the data information display input end of the data information display module, and the network connection end of the controller is connected with the network connection end of the network connection module;
the method comprises the steps that an electromechanical device database is stored on a cloud server, and operation processing is carried out on electromechanical device data on the cloud server after an operation user successfully logs in the cloud server through a client; the control method of the electromechanical equipment database system comprises the following steps:
s1, an operation user logs in a cloud server through a client;
s2, after the login of the operation user is successful, the data of the electromechanical equipment database is input;
s3, operating the user to inquire the integral data input into the electromechanical equipment database; the operation user querying the electromechanical device database comprises the following steps:
s61, grouping words of query words entered by an operation user; respectively A 1 、A 2 、A 3 、……、A n Wherein A is 1 Is the 1 st phrase, A 2 Is the 2 nd phrase, A 3 Is 3 rd phrase, A 4 Is the nth phrase;
Figure FDA0004267156270000011
i is a positive integer less than or equal to n;
s62, for the ith phrase A i Hash operation is performed to obtain H (A) i ) H () is a hash function using MD5, and statistics H (a i ) Number of occurrences of single file content in database:
if it is
Figure FDA0004267156270000012
Is greater than or equal to a preset statistical number, +.>
Figure FDA0004267156270000013
Meaning the ith phrase A in the file name S i The number of occurrences after the hash operation; sequentially arranging and displaying the file names according to the sequence from the large number to the small number for selection by an operation user;
if it is
Figure FDA0004267156270000021
If the number of the file names is smaller than the preset statistics number, displaying the file name with the largest statistics value;
s4, outputting the selected data in a data table form.
2. The electromechanical device database system of claim 1, wherein the information data input module comprises one or any combination of a keyboard unit, a mouse unit, an image acquisition unit, a fingerprint acquisition unit, an rfid reader unit;
the information data output end of the keyboard unit is connected with the keyboard information data input end of the controller, the information data output end of the mouse unit is connected with the mouse information data input end of the controller, the image information data output end of the image acquisition unit is connected with the image information data input end of the controller, the information data output end of the fingerprint acquisition unit is connected with the fingerprint information data input end of the controller, and the information data output end of the rfid reader unit is connected with the rfid information data input end of the controller.
3. The electromechanical device database system according to claim 2, wherein the image acquisition unit is a camera;
the data information display module is a touch display screen.
4. The method of controlling a mechatronic device database system according to claim 1, characterized in that in step S2, operating the user to enter data into the mechatronic device database includes:
the cloud server acquires the authority of an operation user:
if the operation user is a common user, the cloud server stores temporarily the data input and stored by the common user; when the cloud server receives update and preservation of temporary storage data of an administrator user, the cloud server updates a database of the temporary storage data;
if the operation user is an administrator user, the cloud server updates the database of the data stored in the administrator user.
5. A method of controlling a database system of an electromechanical device according to claim 1, wherein the input stored data comprises newly added entry data or/and modified entry data.
6. The method of claim 1, wherein in step S1, the login mode of the operating user includes one or any combination of the following operations:
operation one:
s11, a verification account number and a verification password are preset in a cloud server, and when logging in, a user is operated to input a login account number and a login password;
s12, mapping the input login account characters and login password characters with preset login account characters and login password characters one by one;
s13, carrying out hash operation on a preset login account corresponding to the input login account character to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s14, if the verification is passed, the login is successful;
and (2) operation II:
s21, a verification account number and a verification password are preset in a cloud server, and personal information of an operation user is stored in an rfid electronic tag, wherein the personal information of the operation user comprises an operation user ID;
s22, when the rfid reader-writer unit acquires personal information of an operation user stored in the rfid electronic tag during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s23, carrying out hash operation on the personal information of the operation user stored in the rfid electronic tag obtained by the rfid reader-writer unit to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s24, if the verification is passed, the login is successful;
and (3) operation three:
s31, a verification account number and a verification password are preset in a cloud server;
s32, when the fingerprint acquisition unit acquires the fingerprint of the operation user during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s33, carrying out hash operation on the fingerprint acquired by the fingerprint acquisition unit by the operation user to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s34, if the verification is passed, the login is successful;
operation four:
s41, a verification account number and a verification password are preset in a cloud server;
s42, when the image acquisition unit acquires the dynamic face of the operation user during login, the operation user inputs a login password; wherein, the input login password characters are mapped with the preset login password characters one by one;
s43, carrying out hash operation on the dynamic face of the operation user acquired by the image acquisition unit to obtain a hash account; carrying out hash operation on a preset login password corresponding to the input login password character to obtain a hash password; judging whether the obtained hash account number is identical with a verification account number stored in a cloud server or not;
s44, if the verification is passed, the login is successful.
7. The method of controlling an electromechanical device database system according to claim 6, characterized by comprising the steps of, in step S13:
s131, let the number of errors q=0;
s132, the cloud server judges whether the obtained hash account number is consistent with a verification account number stored by the cloud server:
if the obtained hash account is consistent with the verification account stored by the cloud server, executing step S133;
if the obtained hash account is inconsistent with the verification account stored in the cloud server, prompting the user to input the login account and the login password again; q=q+1; step S134 is performed;
s133, the cloud server judges whether the obtained hash password is consistent with the verification password stored by the cloud server:
if the obtained hash password is consistent with the verification password stored by the cloud server, the verification login is successful; recording the IP and time of login;
if the obtained hash password is inconsistent with the verification password stored by the cloud server, prompting the user to input the login account and the login password again; q=q+1; step S134 is performed;
s134, if the error number Q is greater than or equal to the preset error number, locking the input login account, and prompting the user that the input login account error number reaches the preset number;
if the number of errors Q is less than the preset number of errors, the step S632 is returned;
the step S23 includes the steps of:
s231, let the number of errors q=0;
s232, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and re-acquiring the personal information of the operation user stored in the rfid electronic tag by the rfid reader unit; q=q+1; step S233 is performed;
s233, if the error number Q is greater than or equal to the preset error number, locking the personal information of the operation user stored in the rfid electronic tag by the rfid reader unit, and prompting the error number of the login password input by the operation user to reach the preset number;
if the number of errors Q is less than the preset number of errors, returning to step S232;
the step S33 includes the steps of:
s331, let the number of errors q=0;
s332, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, the verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and enabling the fingerprint acquisition unit to re-acquire the fingerprint of the operation user; q=q+1; step S333 is performed;
s333, if the error number Q is greater than or equal to the preset error number, locking the fingerprint of the operation user acquired by the fingerprint acquisition unit, and prompting the login password input by the operation user that the error number reaches the preset number;
if the number of errors Q is less than the preset number of errors, returning to step S332;
the step S43 includes the steps of:
s431, let the number of errors q=0;
s432, the cloud server inquires whether the verification password corresponding to the obtained hash account number on the cloud server is consistent with the obtained hash password:
if the verification password corresponding to the obtained hash account number on the cloud server is inquired to be consistent with the obtained hash password by the cloud server, the verification login is successful; recording the IP and time of login;
if the verification password corresponding to the obtained hash account number on the cloud server is not consistent with the obtained hash password, prompting the operation user to re-input the login password and enabling the image acquisition unit to re-acquire the dynamic face of the operation user; q=q+1; step S433 is performed;
s433, if the error number Q is greater than or equal to the preset error number, locking the dynamic face of the operation user acquired by the image acquisition unit, and prompting the login password error number input by the operation user to reach the preset number;
if the number of errors Q is less than the preset number of errors, the step S432 is returned.
CN201911235707.XA 2019-12-05 2019-12-05 Electromechanical equipment database system and control method thereof Active CN111026798B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911235707.XA CN111026798B (en) 2019-12-05 2019-12-05 Electromechanical equipment database system and control method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911235707.XA CN111026798B (en) 2019-12-05 2019-12-05 Electromechanical equipment database system and control method thereof

Publications (2)

Publication Number Publication Date
CN111026798A CN111026798A (en) 2020-04-17
CN111026798B true CN111026798B (en) 2023-07-14

Family

ID=70204376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911235707.XA Active CN111026798B (en) 2019-12-05 2019-12-05 Electromechanical equipment database system and control method thereof

Country Status (1)

Country Link
CN (1) CN111026798B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111708658A (en) * 2020-06-09 2020-09-25 孟磊 Judicial-assisted case data risk management system and application method thereof
CN112100654A (en) * 2020-09-02 2020-12-18 军事科学院系统工程研究院网络信息研究所 Terminal-based equipment database resource management method
CN112464192A (en) * 2020-10-26 2021-03-09 国网安徽省电力有限公司信息通信分公司 Power grid data asset management system based on big data
CN112783870A (en) * 2021-02-28 2021-05-11 乔健 Cloud data synchronization system and method for local real-time transitional storage
CN113179246B (en) * 2021-03-19 2022-08-26 重庆扬成大数据科技有限公司 Working method for carrying out government affair data fusion safety through four-in-one network
CN113162916B (en) * 2021-03-19 2022-09-09 重庆扬成大数据科技有限公司 Working method for executing smart city operation instruction through big data platform
CN113312536B (en) * 2021-05-28 2022-11-08 中铁十一局集团第五工程有限公司 Engineering survey intelligent management control platform
CN113312535B (en) * 2021-05-28 2023-02-24 中铁十一局集团第五工程有限公司 Engineering survey intelligent management control cloud platform
CN113793196A (en) * 2021-08-31 2021-12-14 宁夏百川电力股份有限公司 Electricity doctor sells electricity management system based on cloud calculates
CN113656790A (en) * 2021-08-31 2021-11-16 重庆长风化学工业有限公司 Control method for generating phosgene platform system
CN114553528B (en) * 2022-02-22 2024-04-19 成都睿智兴华信息技术有限公司 Internal and external network data safety transmission system and transmission method thereof
CN115022349A (en) * 2022-06-07 2022-09-06 杭州爱软测信息技术有限公司 Cloud storage file access control system based on address service

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095829A (en) * 2013-01-15 2013-05-08 上海交通大学 Network contact list system achieving version management and authority management
US20190034646A1 (en) * 2016-03-28 2019-01-31 Hitachi, Ltd. Database system and data retrieval method
CN110493197A (en) * 2019-07-25 2019-11-22 深圳壹账通智能科技有限公司 A kind of login process method and relevant device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095829A (en) * 2013-01-15 2013-05-08 上海交通大学 Network contact list system achieving version management and authority management
US20190034646A1 (en) * 2016-03-28 2019-01-31 Hitachi, Ltd. Database system and data retrieval method
CN110493197A (en) * 2019-07-25 2019-11-22 深圳壹账通智能科技有限公司 A kind of login process method and relevant device

Also Published As

Publication number Publication date
CN111026798A (en) 2020-04-17

Similar Documents

Publication Publication Date Title
CN111026798B (en) Electromechanical equipment database system and control method thereof
US9679038B2 (en) Systems and methods for construction field management and operations with building information modeling
US7640165B2 (en) Web based methods and systems for managing compliance assurance information
US8131560B2 (en) Systems and methods for managing regulatory information
CN110210775B (en) Information management platform, application and method thereof
CN108898317B (en) Method for respectively authorizing form operation authority according to form field values
CN108574620A (en) A kind of data subscription method, device, server and system
CN108920914B (en) Authority control method and device
JP5824732B2 (en) Employee information management system, information processing apparatus, employee information management system generation method, employee information management system generation program, and information acquisition method
US7840010B2 (en) Interactive security control system with conflict checking
CN109961264A (en) A kind of enterprise information management system and management method
CN113592680A (en) Service platform based on regional education big data
US20070208698A1 (en) Avoiding duplicate service requests
CN111274464A (en) Knowledge management system
US20030004988A1 (en) Drawings data mangement system, method and program
CN115344888A (en) Data access method and device, electronic equipment and storage medium
CN115082036A (en) Data management method and device, electronic equipment and storage medium
US10430413B2 (en) Data information framework
US20060268758A1 (en) Interactive security control system with audit capabilities
CN110728567A (en) Electronic invoice reimbursement management system and method
CN109829841A (en) A kind of design method of government procurement evaluation expert management system
US20180293681A1 (en) Automated background checks
CN109670728B (en) Ship design quality information management system based on database
CN111047301A (en) Spacecraft development process management system and method
US20040044540A1 (en) Distributed environmental health & safety data collection and reporting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 214104 room 301-218, block a, Xidong chuangrong building, No. 78, Danshan Road, anzhen street, Xishan District, Wuxi City, Jiangsu Province

Applicant after: Jiangsu CRRC Urban Development Co.,Ltd.

Applicant after: CRRC CONSTRUCTION ENGINEERING Co.,Ltd.

Address before: 215000 NO.115 Yinsheng Road, Shengpu Town, Suzhou Industrial Park, Jiangsu Province

Applicant before: SUZHOU CHINA VEHICLE CONSTRUCTION ENGINEERING Co.,Ltd.

Applicant before: CRRC CONSTRUCTION ENGINEERING Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant