CN114417383A - Industrial Internet system password application management system - Google Patents

Industrial Internet system password application management system Download PDF

Info

Publication number
CN114417383A
CN114417383A CN202210061666.2A CN202210061666A CN114417383A CN 114417383 A CN114417383 A CN 114417383A CN 202210061666 A CN202210061666 A CN 202210061666A CN 114417383 A CN114417383 A CN 114417383A
Authority
CN
China
Prior art keywords
password
module
login
industrial internet
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210061666.2A
Other languages
Chinese (zh)
Inventor
汤洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202210061666.2A priority Critical patent/CN114417383A/en
Publication of CN114417383A publication Critical patent/CN114417383A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a password application management system of an industrial Internet system, which comprises a login security monitoring module, a password input regulation module and a technical verification decryption module, and is characterized in that: the login security monitoring module is used for monitoring and analyzing the surrounding environment in the process of logging in the industrial Internet system by an operator, the password input regulation and control module is electrically connected with the login security monitoring module, the password input regulation and control module is used for displaying and operating a login password intelligently regulated and controlled according to the environmental condition when the login password is input, the technical verification decryption module is used for verifying the technical level of the operator control equipment system to decrypt the industrial Internet system, and the login security monitoring module comprises a system password management module, an encryption grade acquisition module and an operating environment analysis module.

Description

Industrial Internet system password application management system
Technical Field
The invention relates to the technical field of industrial internet data encryption, in particular to a password application management system of an industrial internet system.
Background
The essence of the industrial internet is that equipment, production lines, factories, suppliers, products and customers are closely connected and fused through an open and global industrial-level network platform, and various element resources in industrial economy are efficiently shared, so that the cost is reduced, the efficiency is increased, the manufacturing industry is helped to extend the industrial chain, and the transformation development of the manufacturing industry is promoted through an automatic and intelligent production mode.
In recent years, the construction of domestic digital workshops has been rapidly developed, and particularly, digital workshops represented by electronic component manufacturing and processing platforms can manage devices, acquire device data, debug device functions and the like in the form of internet data by using an industrial internet system. However, although an encryption step is provided in the operation process of the existing industrial internet system, an unauthorized operator cannot perform corresponding operation on the industrial internet system, but the operation is usually performed in a dust-free workshop in order to ensure that the quality of processed electronic products is not affected when electronic components are manufactured and processed, the operator wears dust-free clothes, dust-free caps, dust-free glasses, dust-free gloves and the like, and cannot use unlocking modes such as human face fingerprints with higher safety, so that the decryption operation is a traditional input password mode. Similarly, operators with higher authorization level face a plurality of intelligent devices in a workshop, and because different devices correspond to different industrial internet system passwords and the passwords are frequently changed, the authorized operators often forget a plurality of passwords and delay the operation progress; and because some passwords are simpler, operators can easily peep the passwords when inputting the passwords into the industrial Internet system, and the possibility of equipment abnormality caused by misoperation of unauthorized personnel is caused. Therefore, it is necessary to design a password application management system for an industrial internet system with high security and practicability.
Disclosure of Invention
The invention aims to provide a password application management system of an industrial internet system to solve the problems in the background technology.
In order to solve the technical problems, the invention provides the following technical scheme: a password application management system of an industrial Internet system comprises a login security monitoring module, a password input regulation and control module and a technical verification decryption module, wherein the login security monitoring module is used for monitoring and analyzing the surrounding environment in the process of logging in the industrial Internet system by an operator, the password input regulation and control module is electrically connected with the login security monitoring module, the password input regulation and control module is used for intelligently regulating and controlling the display and operation of a login password according to the environment condition when the login password is input, and the technical verification decryption module is used for verifying the technical level of an operating equipment system of the operator to perform decryption operation of the industrial Internet system;
the login security monitoring module comprises a system password management module, an encryption grade acquisition module and an operating environment analysis module, the system password management module is used for acquiring an encryption password corresponding to an authorized operation grade of an industrial internet system and matching the encryption password corresponding to the authorized operation of the current operator, the encryption grade acquisition module is electrically connected with the system password management module, the encryption grade acquisition module is used for identifying and judging the security grade of the current encryption password, the operating environment analysis module is electrically connected with the system password management module, and the operating environment analysis module is used for analyzing the operating environment condition when the password is input.
According to the technical scheme, the password input regulation and control module comprises a character insertion control module and a font display control module, the character insertion control module is electrically connected with the encryption grade acquisition module and the operation environment analysis module, the character insertion control module is used for regulating and controlling insertion extra character input in the password input process of an operator, the font display control module is electrically connected with the character insertion control module and the operation environment analysis module, and the font display control module is used for regulating and controlling insertion extra character size of screen prompt in the password input process of the operator.
According to the technical scheme, the technical verification decryption module comprises an operation level matching module and a simulation operation auditing module, the operation level matching module is used for matching a simulation operation question bank according to the logged-in obtained operation level of the industrial internet system, and the simulation operation auditing module is used for auditing the simulation operation of an operator in the industrial internet system.
According to the technical scheme, the operating environment analysis module comprises a thermal imaging sub-module, a secondary selection calibration unit and a distance detection unit, the thermal imaging sub-module is used for detecting infrared energy in a detection area and converting the infrared energy into an electric signal to carry out thermal imaging, the secondary selection calibration unit is electrically connected with the thermal imaging sub-module, the secondary selection calibration unit is used for judging the position of a portrait in a thermal imaging picture and calibrating a target portrait at a second position, the distance detection unit is electrically connected with the secondary selection calibration unit, and the distance detection unit is used for tracking a calibration direction and detecting a calibration target distance.
According to the technical scheme, the operation method of the industrial internet system password application management system comprises the following steps:
step S1: in a digital workshop, when an operator prepares to operate and control a management device, the operator starts to log in an industrial internet system of the device, a login safety monitoring module is started, and the operation safety monitoring during system login is started;
step S2: after the monitoring and analyzing process, real-time monitoring and analyzing results are transmitted to a password input regulation and control module, an operator inputs a login password corresponding to target level authorization operation, and the password input regulation and control module intelligently regulates and controls the display and operation of the input password according to detection and analysis results;
step S3: and after the password is successfully logged in, completing the login operation of the industrial Internet system, starting to operate and control the management equipment, and when the password is failed to log in or the operator forgets to log in the password, the operator can select a technical verification mode to log in the industrial Internet system.
According to the above technical solution, the step S1 further includes the following steps:
step S11: after an operator selects an operation level needing authorization, a system password management module acquires a login password corresponding to the operation level;
step S12: the encryption grade acquisition module judges the encryption coefficient of the current login password according to the character number, the character type and the character regularity of the login password and outputs the encryption coefficient;
step S13: starting a thermal imaging sub-module to control and scan the surrounding environment of the current system equipment;
step S14: after the thermal imaging pictures are obtained, determining the face pictures of the portrait through thermal imaging contour fitting, and if the number of the face pictures of the portrait is more than one, comparing the area of display pixels of each face picture of the portrait in the thermal imaging pictures;
step S15: selecting a portrait face picture with a second pixel area rank according to the comparison result, and tracking and calibrating the portrait face picture;
step S16: obtaining a calibration signal, locking the direction of the calibration signal in an imaging picture by a distance detection unit, emitting distance detection light and obtaining a calibration target distance value;
step S17: and the operating environment analysis module analyzes the environmental risk value in the operating process of the login system in real time. According to the above technical solution, the method for determining the encryption level in step S12 is as follows: by the formula
Figure BDA0003478599340000041
Figure BDA0003478599340000042
Calculating an encryption coefficient, wherein Q is an encryption coefficient value of the login password, k is a character regularity coefficient of the login password, the higher the character continuity and the identity are, the larger k is, s is the number of characters of the login password, and z is the character type of the login password;
the method for analyzing the environmental risk value in step S17 includes: when the thermal imaging contour fitting determines that the number of face pictures of the portrait is more than one, acquiring a calibrated target distance value L, wherein the environmental risk value is W, the calculation formula of W is W-sigma-L, wherein sigma is a conversion coefficient of the target distance value and the environmental risk value and is a constant greater than 0; when the thermal imaging contour fitting determines that the face picture of the portrait is one, the environmental risk value W is 0.
According to the above technical solution, the step S2 further includes the following steps:
step S21: when an operator inputs a login password corresponding to target level authorization operation, the encryption level acquisition module transmits the encryption coefficient value of the password to the character insertion control module;
step S22: the character interleaving control module starts random interleaving of random characters in the login password number sequence according to the encryption coefficient value interval, wherein the larger the encryption coefficient value is, the fewer the interleaved random character numbers are, otherwise, the more the interleaved random character numbers are, and the random characters comprise any number, letter and symbol;
step S23: after the random character control is inserted, the font display control module controls the equipment display end to display the random character and the insertion position, and an operator inputs a login password according to the prompt of the display content;
step S24: the font of the display content can be inversely proportional changed according to the environmental risk value, when the environmental risk value W is 0, the display content is normally displayed, when the environmental risk value W is larger, the font of the display content is smaller, and when the environmental risk value W is larger than the threshold value Y, the font display control module controls the display end of the equipment to hide the content for display.
According to the above technical solution, the step S3 further includes the following steps:
step S31: when the password login fails or the operator forgets to login the password, the operator selects to start the technical verification decryption module;
step S32: selecting the operation level of the industrial internet system to be logged in, and starting to match the simulation operation question bank;
step S33: and submitting the completed data within the specified time, verifying the submitted content by the simulation operation verifying module, allowing the login to the industrial Internet system when the preset verifying standard is reached, and otherwise, failing to log in if the data is not submitted within the specified time.
Compared with the prior art, the invention has the following beneficial effects: according to the invention, by arranging the login security monitoring module, the password input regulation module and the technical verification decryption module, a login password can be managed in the process of logging in the industrial Internet system, the encryption coefficient analysis of the login password is realized internally, the analysis of the operating environment danger value is realized externally, the login password display and operation in the login process are controlled according to the analysis result, the password can be effectively prevented from being peeped and stolen even in the traditional input password login process, meanwhile, the login can be completed in a technical verification mode when an operator forgets to log in the password, and the problem that the authorized operator often forgets numerous passwords due to frequent password replacement and delays the operation progress is avoided.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic diagram of the system module composition of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides a technical solution: a password application management system of an industrial Internet system comprises a login security monitoring module, a password input regulation and control module and a technical verification decryption module, wherein the login security monitoring module is used for monitoring and analyzing the surrounding environment in the process of logging in the industrial Internet system by an operator;
the login security monitoring module comprises a system password management module, an encryption grade acquisition module and an operation environment analysis module, wherein the system password management module is used for acquiring an encryption password corresponding to the authorized operation grade of the industrial Internet system and matching the encryption password corresponding to the authorized operation required by the current operator, the encryption grade acquisition module is electrically connected with the system password management module, the encryption grade acquisition module is used for identifying and judging the security grade of the current encryption password, the operation environment analysis module is electrically connected with the system password management module, and the operation environment analysis module is used for analyzing the operation environment condition when the password is input; by arranging the login security monitoring module, the password input regulation and control module and the technical verification decryption module, a login password can be managed in the process of logging in the industrial Internet system, the encryption coefficient of the login password is analyzed internally, the dangerous value of the operating environment is analyzed externally, the login password display and operation in the login process are controlled according to the analysis result, the password can be effectively prevented from being peeped and stolen even in the traditional input password login process, meanwhile, the login can be completed in a technical verification mode when an operator forgets to log in the password, and the phenomenon that the authorized operator often forgets numerous passwords and delays the operation progress due to frequent password replacement is avoided.
The password input regulation and control module comprises a character insertion control module and a font display control module, the character insertion control module is electrically connected with the encryption grade acquisition module and the operating environment analysis module, the character insertion control module is used for regulating and controlling insertion extra character input in the password input process of an operator, the font display control module is electrically connected with the character insertion control module and the operating environment analysis module, and the font display control module is used for regulating and controlling insertion extra character size of screen prompt in the password input process of the operator.
The technical verification decryption module comprises an operation level matching module and a simulation operation auditing module, wherein the operation level matching module is used for matching a simulation operation question bank according to the logged-in acquired operation level of the industrial internet system, and the simulation operation auditing module is used for auditing the simulation operation of an operator in the industrial internet system; and then realize the effect of technical verification to current operating personnel, avoid the not enough personnel maloperation of technique to cause the possibility of equipment anomaly, can also assist operating personnel to warm and look after technical knowledge.
The operating environment analysis module comprises a thermal imaging sub-module, a secondary selection calibration unit and a distance detection unit, wherein the thermal imaging sub-module is used for detecting infrared energy in a detection area and converting the infrared energy into an electric signal to carry out thermal imaging, the secondary selection calibration unit is electrically connected with the thermal imaging sub-module and used for judging the position of a portrait in a thermal imaging picture and calibrating a target portrait at a second position, the distance detection unit is electrically connected with the secondary selection calibration unit, and the distance detection unit is used for tracking a calibration direction and detecting a calibration target distance.
The operation method of the industrial Internet system password application management system comprises the following steps:
step S1: in a digital workshop, when an operator prepares to operate and control a management device, the operator starts to log in an industrial internet system of the device, a login safety monitoring module is started, and the operation safety monitoring during system login is started;
step S2: after the monitoring and analyzing process, real-time monitoring and analyzing results are transmitted to a password input regulation and control module, an operator inputs a login password corresponding to target level authorization operation, and the password input regulation and control module intelligently regulates and controls the display and operation of the input password according to detection and analysis results;
step S3: and after the password is successfully logged in, completing the login operation of the industrial Internet system, starting to operate and control the management equipment, and when the password is failed to log in or the operator forgets to log in the password, the operator can select a technical verification mode to log in the industrial Internet system.
Step S1 further includes the steps of:
step S11: after an operator selects an operation level needing authorization, a system password management module acquires a login password corresponding to the operation level;
step S12: the encryption grade acquisition module judges the encryption coefficient of the current login password according to the character number, the character type and the character regularity of the login password and outputs the encryption coefficient;
step S13: starting a thermal imaging sub-module to control and scan the surrounding environment of the current system equipment;
step S14: after the thermal imaging pictures are obtained, determining the face pictures of the portrait through thermal imaging contour fitting, and if the number of the face pictures of the portrait is more than one, comparing the area of display pixels of each face picture of the portrait in the thermal imaging pictures;
step S15: selecting a portrait face picture with a second pixel area rank according to the comparison result, and tracking and calibrating the portrait face picture;
step S16: obtaining a calibration signal, locking the direction of the calibration signal in an imaging picture by a distance detection unit, emitting distance detection light and obtaining a calibration target distance value;
step S17: and the operating environment analysis module analyzes the environmental risk value in the operating process of the login system in real time.
Encryption in step S12, etcThe stage judgment method comprises the following steps: by the formula
Figure BDA0003478599340000081
Calculating an encryption coefficient, wherein Q is an encryption coefficient value of the login password, k is a character regularity coefficient of the login password, the higher the character continuity and the identity are, the larger k is, s is the number of characters of the login password, and z is the character type of the login password; according to the formula, when the number of characters of the login password is more, the types of the characters are more, and the character rule coefficient is smaller, the encryption coefficient is higher, the encryption grade of the login password is higher, the login password is more difficult to be peeped and then remembered, and otherwise, the login password is simpler and is easier to remember;
the analysis method of the environmental risk value in step S17 is as follows: when the thermal imaging contour fitting determines that the number of face pictures of the portrait is more than one, acquiring a calibrated target distance value L, wherein the environmental risk value is W, the calculation formula of W is W-sigma-L, wherein sigma is a conversion coefficient of the target distance value and the environmental risk value and is a constant greater than 0; when the thermal imaging contour fitting determines that the number of face pictures of the portrait is one, the environmental risk value W is 0; in the process of logging in the industrial internet system, at least the contour of the thermal imaging picture fits the face picture of the current operator, if only one picture is obtained, no other person is nearby in the password input process, and the operation environment is analyzed without danger, so the environmental danger value is 0, if the thermal imaging contour fitting determines that the face picture of the person is larger than one picture, the calibrated pixel area is tracked to rank the face picture of the person which is the closest to the password input person, the calibrated target distance value is obtained, and the closer the equipment is, the higher the possibility of peeping the login password is, so the higher the risk degree of the current operation environment is, and the operation environment risk value is in direct proportion to the target distance value.
Step S2 further includes the steps of:
step S21: when an operator inputs a login password corresponding to target level authorization operation, the encryption level acquisition module transmits the encryption coefficient value of the password to the character insertion control module;
step S22: the character interleaving control module starts random interleaving of random characters in the login password number sequence according to the encryption coefficient value interval, wherein the larger the encryption coefficient value is, the fewer the interleaved random character numbers are, otherwise, the more the interleaved random character numbers are, and the random characters comprise any number, letter and symbol; the random characters are randomly inserted into the login password, so that the encryption coefficient of the login password can be increased, the phenomenon that the password which is too simple is stolen by peeping and other behaviors is avoided, the insertion number of the random characters can be controlled according to the encryption coefficient value of the current password, and the balance between safety and convenience is realized;
step S23: after the random character control is inserted, the font display control module controls the equipment display end to display the random character and the insertion position, and an operator inputs a login password according to the prompt of the display content;
step S24: the font of the display content is inversely proportional changed according to the environmental risk value, when the environmental risk value W is 0, the display content is normally displayed, when the environmental risk value W is larger, the font of the display content is smaller, and if the environmental risk value W is larger than the threshold value Y, the font display control module controls the display end of the equipment to hide the content for display; therefore, the content of the display prompt can be regulated and controlled in real time in the password input process of an operator, the display content is prevented from being easily seen by other peripheral personnel when the operating environment danger value is high, the display content is hidden when the operating environment danger value reaches a threshold value, the current operating environment is judged to be not suitable for inputting the password, the system login process is suspended, and the safety is further improved; meanwhile, compared with the prior art, the problem that the efficiency of logging in the system is delayed due to misjudgment caused by the fact that the personnel are hidden and displayed once detected when the operator inputs the password can be avoided.
Step S3 further includes the steps of:
step S31: when the password login fails or the operator forgets to login the password, the operator selects to start the technical verification decryption module;
step S32: selecting the operation level of the industrial internet system to be logged in, and starting to match the simulation operation question bank; further realizing the function of technical verification of the current operators and avoiding the possibility of equipment abnormality caused by misoperation of the technicians with insufficient technology;
step S33: submitting the completion data within the specified time, verifying the submitted content by the simulation operation verifying module, allowing logging in the industrial Internet system when the verification standard is reached, or failing to log in if the verification is not submitted within the specified time; the password input method can avoid that an authorized operator often forgets a plurality of passwords due to frequent password replacement and delays the operation progress, can improve the possibility of preventing peeping and stealing compared with the traditional password input type login, and can help the operator to review technical knowledge.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. The utility model provides an industry internet system password application management system, includes login security monitoring module, password input regulation and control module and technical verification decryption module, its characterized in that: the login security monitoring module is used for monitoring and analyzing the surrounding environment in the process of logging in the industrial Internet system by an operator, the password input regulation and control module is electrically connected with the login security monitoring module, the password input regulation and control module is used for displaying and operating a login password intelligently regulated and controlled according to the environmental condition when the login password is input, and the technical verification decryption module is used for verifying the technical level of the equipment system operated by the operator to perform decryption operation on the industrial Internet system;
the login security monitoring module comprises a system password management module, an encryption grade acquisition module and an operating environment analysis module, the system password management module is used for acquiring an encryption password corresponding to an authorized operation grade of an industrial internet system and matching the encryption password corresponding to the authorized operation of the current operator, the encryption grade acquisition module is electrically connected with the system password management module, the encryption grade acquisition module is used for identifying and judging the security grade of the current encryption password, the operating environment analysis module is electrically connected with the system password management module, and the operating environment analysis module is used for analyzing the operating environment condition when the password is input.
2. The industrial internet system password application management system according to claim 1, wherein: password input regulation and control module includes character interlude control module and typeface display control module, the character interlude control module obtains module and operational environment analysis module electricity with encryption level and is connected, the character interlude control module is used for the extra character of regulation and control interlude in operating personnel input password in-process and types, typeface display control module is connected with character interlude control module and operational environment analysis module electricity, typeface display control module is used for the extra character size of interlude of regulation and control screen prompt in operating personnel input password in-process.
3. The industrial internet system password application management system according to claim 2, wherein: the technical verification decryption module comprises an operation level matching module and a simulation operation auditing module, the operation level matching module is used for matching a simulation operation question bank according to the operation level of the logged-in obtained industrial internet system, and the simulation operation auditing module is used for auditing the simulation operation of an operator in the industrial internet system.
4. The industrial internet system password application management system according to claim 3, wherein: the operating environment analysis module comprises a thermal imaging sub-module, a secondary selection calibration unit and a distance detection unit, wherein the thermal imaging sub-module is used for detecting infrared energy in a detection area and converting the infrared energy into an electric signal to carry out thermal imaging, the secondary selection calibration unit is electrically connected with the thermal imaging sub-module, the secondary selection calibration unit is used for judging the position of a portrait in a thermal imaging picture and calibrating a target portrait at a second position, the distance detection unit is electrically connected with the secondary selection calibration unit, and the distance detection unit is used for tracking a calibration direction and detecting a calibration target distance.
5. The industrial internet system password application management system according to claim 4, wherein: the operation method of the industrial Internet system password application management system comprises the following steps:
step S1: in a digital workshop, when an operator prepares to operate and control a management device, the operator starts to log in an industrial internet system of the device, a login safety monitoring module is started, and the operation safety monitoring during system login is started;
step S2: after the monitoring and analyzing process, real-time monitoring and analyzing results are transmitted to a password input regulation and control module, an operator inputs a login password corresponding to target level authorization operation, and the password input regulation and control module intelligently regulates and controls the display and operation of the input password according to detection and analysis results;
step S3: and after the password is successfully logged in, completing the login operation of the industrial Internet system, starting to operate and control the management equipment, and when the password is failed to log in or the operator forgets to log in the password, the operator can select a technical verification mode to log in the industrial Internet system.
6. The industrial internet system password application management system according to claim 5, wherein: the step S1 further includes the steps of:
step S11: after an operator selects an operation level needing authorization, a system password management module acquires a login password corresponding to the operation level;
step S12: the encryption grade acquisition module judges the encryption coefficient of the current login password according to the character number, the character type and the character regularity of the login password and outputs the encryption coefficient;
step S13: starting a thermal imaging sub-module to control and scan the surrounding environment of the current system equipment;
step S14: after the thermal imaging pictures are obtained, determining the face pictures of the portrait through thermal imaging contour fitting, and if the number of the face pictures of the portrait is more than one, comparing the area of display pixels of each face picture of the portrait in the thermal imaging pictures;
step S15: selecting a portrait face picture with a second pixel area rank according to the comparison result, and tracking and calibrating the portrait face picture;
step S16: obtaining a calibration signal, locking the direction of the calibration signal in an imaging picture by a distance detection unit, emitting distance detection light and obtaining a calibration target distance value;
step S17: and the operating environment analysis module analyzes the environmental risk value in the operating process of the login system in real time.
7. The industrial internet system password application management system according to claim 6, wherein: the method for judging the encryption level in step S12 is as follows: by the formula
Figure FDA0003478599330000031
Calculating an encryption coefficient, wherein Q is an encryption coefficient value of the login password, k is a character regularity coefficient of the login password, the higher the character continuity and the identity are, the larger k is, s is the number of characters of the login password, and z is the character type of the login password;
the method for analyzing the environmental risk value in step S17 includes: when the thermal imaging contour fitting determines that the number of face pictures of the portrait is more than one, acquiring a calibrated target distance value L, wherein the environmental risk value is W, the calculation formula of W is W-sigma-L, wherein sigma is a conversion coefficient of the target distance value and the environmental risk value and is a constant greater than 0; when the thermal imaging contour fitting determines that the face picture of the portrait is one, the environmental risk value W is 0.
8. The industrial internet system password application management system according to claim 7, wherein: the step S2 further includes the steps of:
step S21: when an operator inputs a login password corresponding to target level authorization operation, the encryption level acquisition module transmits the encryption coefficient value of the password to the character insertion control module;
step S22: the character interleaving control module starts random interleaving of random characters in the login password number sequence according to the encryption coefficient value interval, wherein the larger the encryption coefficient value is, the fewer the interleaved random character numbers are, otherwise, the more the interleaved random character numbers are, and the random characters comprise any number, letter and symbol;
step S23: after the random character control is inserted, the font display control module controls the equipment display end to display the random character and the insertion position, and an operator inputs a login password according to the prompt of the display content;
step S24: the font of the display content can be inversely proportional changed according to the environmental risk value, when the environmental risk value W is 0, the display content is normally displayed, when the environmental risk value W is larger, the font of the display content is smaller, and when the environmental risk value W is larger than the threshold value Y, the font display control module controls the display end of the equipment to hide the content for display.
9. The industrial internet system password application management system according to claim 8, wherein: the step S3 further includes the steps of:
step S31: when the password login fails or the operator forgets to login the password, the operator selects to start the technical verification decryption module;
step S32: selecting the operation level of the industrial internet system to be logged in, and starting to match the simulation operation question bank;
step S33: and submitting the completed data within the specified time, verifying the submitted content by the simulation operation verifying module, allowing the login to the industrial Internet system when the preset verifying standard is reached, and otherwise, failing to log in if the data is not submitted within the specified time.
CN202210061666.2A 2022-01-19 2022-01-19 Industrial Internet system password application management system Pending CN114417383A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210061666.2A CN114417383A (en) 2022-01-19 2022-01-19 Industrial Internet system password application management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210061666.2A CN114417383A (en) 2022-01-19 2022-01-19 Industrial Internet system password application management system

Publications (1)

Publication Number Publication Date
CN114417383A true CN114417383A (en) 2022-04-29

Family

ID=81275895

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210061666.2A Pending CN114417383A (en) 2022-01-19 2022-01-19 Industrial Internet system password application management system

Country Status (1)

Country Link
CN (1) CN114417383A (en)

Similar Documents

Publication Publication Date Title
WO2018118120A1 (en) Analysis of reflections of projected light in varying colors, brightness, patterns, and sequences for liveness detection in biometric systems
JP6295534B2 (en) Programmable display, control method, and program
CN103593594A (en) System and method for providing secure access to an electronic device using facial biometric identification and screen gesture
CN1703002A (en) Portable one-time dynamic password generator and security authentication system using the same
US9580295B2 (en) Systems and methods for fuel dispenser security
JP2003150550A (en) Information processing system
CN111698224B (en) Water quality monitoring terminal user verification method and system and water quality monitoring internet of things terminal
CN107580002B (en) Double-factor authentication security manager login system and method
CN2865145Y (en) Portable disposable dynamic code generator and safety identification system using this
CN115098843A (en) Authority management system and method of numerical control system based on face recognition
CN110895599B (en) Access right determination device and access right determination method
CN114417383A (en) Industrial Internet system password application management system
KR101624276B1 (en) Method and apparatus for detecting icon spoofing of mobile application
Pfrang et al. Automated security testing for web applications on industrial automation and control systems
CN112287313A (en) Device authentication system and method
KR101632582B1 (en) Method and system for user authentication using password included random key
AU2011224140B2 (en) Controlling Access to a Control Panel Compartment
CN112257053A (en) Image verification code generation method and system based on universal anti-disturbance
CN112182556A (en) Pressure dimension test system for intelligent unlocking
CN217643389U (en) Portable operation and maintenance gateway capable of being monitored and operation and maintenance monitoring system
CN114466358B (en) User identity continuous authentication method and device based on zero trust
JP2005115461A (en) Electronic equipment controller using face matching
GB2542753A (en) Password authentication apparatus
CN117478363B (en) Photovoltaic power network safety monitoring system and method based on industrial Internet situation awareness
CN117371048B (en) Remote access data processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination