CN115859233A - Human-computer interaction authority management method and system based on EPICS - Google Patents

Human-computer interaction authority management method and system based on EPICS Download PDF

Info

Publication number
CN115859233A
CN115859233A CN202211471403.5A CN202211471403A CN115859233A CN 115859233 A CN115859233 A CN 115859233A CN 202211471403 A CN202211471403 A CN 202211471403A CN 115859233 A CN115859233 A CN 115859233A
Authority
CN
China
Prior art keywords
user
authority
permission
login
ioc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211471403.5A
Other languages
Chinese (zh)
Inventor
林晨
王一凡
王强
夏亚东
冯立文
李方楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University
Original Assignee
Peking University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University filed Critical Peking University
Priority to CN202211471403.5A priority Critical patent/CN115859233A/en
Publication of CN115859233A publication Critical patent/CN115859233A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention relates to a man-machine interaction authority management method and a man-machine interaction authority management system. The method comprises the following steps: running EPICSIOC in an IOC server of a control subnet, deploying a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of a user subnet, determining a gateway server, and deploying a CA gateway and a MySQL database; developing a matched login window in a human-computer interaction interface, and setting an authority management auxiliary IOC; according to the user name input by the login window, issuing the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC, and determining the authority group recording process variable corresponding to the current host and the user recording process variable corresponding to the current host; and in the authority configuration file of the CA gateway, configuring the open authority of each host according to the authority group recording process variable and the user recording process variable. The invention can not influence other programs operated by the current host computer when the user switches the behavior.

Description

Human-computer interaction authority management method and system based on EPICS
Technical Field
The invention relates to the field of human-computer interaction authority management, in particular to a human-computer interaction authority management method and system based on control system application developed in an EPICS environment.
Background
Large scientific devices such as laser accelerators have the characteristics of more equipment, complex subsystems, more workers and experimenters and the like. Based on the complexity of the system, corresponding authority control needs to be carried out on the operation of personnel in the debugging and using processes of the device, and system faults, equipment damage and the like caused by misoperation are prevented. The operator authority is managed by dividing different operation levels, and the management mode is divided into horizontal authority division and longitudinal authority division, wherein the former means division aiming at different equipment areas of an accelerator device, and the latter means division aiming at different personnel group operation levels in the same area.
Experimental Physics and Industrial Control System (EPICS) is a commonly used architecture of a large scientific device Control System, data is released in the form of Process Variables (PV), and a basic access mechanism of the System is a channel access mechanism called Channel Access (CA) established on top of TCP/IP protocol. Phoebus is a human-computer interaction interface development tool of EPICS. In the architecture, under the requirement that the operation of an Input Output Controller (IOC) is not influenced and only a frontmost human-computer interaction layer is managed, the isolation and access authority of a network segment can be controlled by deploying a CA gateway across the network segment to a host where a human-computer interaction interface is located, so that a general user of a control system cannot directly modify a lower-layer program and a variable.
The management of the CA gateway to the authority is based on three judgments: and judging the access request source host, the current user of the access source host and the current running time. The first one is verified through the name of the host of the source of the capture request, the second one is verified through the current account of the operating system of the host of the source of the capture request, and the third one is judged in real time through the operation written in the authority configuration file. However, in order to realize the functions of user authentication and authority management, the development goal of the authority management system is to realize authority management of user fineness and to realize login, logout and real-time authority change of a user in a set of human-computer interaction interfaces developed based on Phoebus. The CA gateway captures the user judgment mode of the current user from the host operating system, so that account switching needs to be performed through host operating system user switching, the program operated by the current host is influenced, the target of free switching of the users in the human-computer interaction interface cannot be realized, the CA gateway is not suitable for application scenes of different hosts switched by the same user, and the corresponding design requirements cannot be met.
Disclosure of Invention
The invention aims to provide a man-machine interaction authority management method and a man-machine interaction authority management system, which are used for solving the problems that the current program operated by a host computer is influenced by user switching, and users in a man-machine interaction interface cannot be freely switched.
A man-machine interaction authority management method comprises the following steps:
running EPICS IOC in an IOC server of a control subnet, deploying a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of a user subnet, using a dual-network-card server spanning a network segment of the control subnet and a network segment of the user subnet as a gateway server, deploying a CA gateway and a MySQL database, and storing a user name, a password and an authority group to which a user belongs in the MySQL database by taking the user name as a main key;
developing a matched login window in the human-computer interaction interface, and setting an authority management auxiliary IOC; the login window is linked with the MySQL database; the authority management auxiliary IOC is used for reading current login users of all the hosts and authority groups to which the users belong;
according to the user name input by the login window, issuing the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC, and determining the authority group record process variable corresponding to the current host and the user record process variable corresponding to the current host;
in the authority configuration file of the CA gateway, configuring the open authority of each host according to the authority group recording process variable and the user recording process variable; the open permissions include inaccessible, read-only, and writable permissions.
Optionally, the issuing, according to the user name input in the login window, the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC, and determining the authority group recording process variable corresponding to the current host and the user recording process variable corresponding to the current host, before further including:
and verifying the user name and the password input by the login window by utilizing the MySQL database.
Optionally, configuring, in the authority configuration file of the CA gateway, the open authority of each host according to the authority group recording process variable and the user recording process variable, and then further including:
and carrying out permission level division on the opening permission, so that the low-level read-only permission reads the numerical value of the process variable which opens the low-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC, and the high-level read-only permission reads the configuration information of the process variable which opens the high-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC.
A human-computer interaction rights management system comprising:
the deployment module is used for operating EPICS IOC in an IOC server of the control subnet, deploying a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of the user subnet, using a dual network card server spanning a network segment of the control subnet and a network segment of the user subnet as a gateway server, deploying a CA gateway and a MySQL database, and storing a user name, a password and a permission group to which the user belongs in the MySQL database by taking the user name as a main key;
the authority management auxiliary IOC setting and login window linking module is used for developing a matched login window in the human-computer interaction interface and setting the authority management auxiliary IOC; the login window is linked with the MySQL database; the authority management auxiliary IOC is used for reading current login users of all the hosts and authority groups to which the users belong;
the process variable recording module is used for issuing the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC according to the user name input by the login window, and determining the authority group record process variable corresponding to the current host and the user record process variable corresponding to the current host;
the open authority configuration module is used for configuring the open authority of each host according to the authority group record process variable and the user record process variable in an authority configuration file of the CA gateway; the open permissions include inaccessible, read-only, and writable permissions.
Optionally, the method further includes:
and the verification unit is used for verifying the user name and the password input by the login window by utilizing the MySQL database.
Optionally, the method further includes:
and the permission level division module is used for carrying out permission level division on the opening permission, so that the low-level read-only permission reads the numerical value of the process variable which opens the low-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC, and the high-level read-only permission reads the configuration information of the process variable which opens the high-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC.
An electronic device comprises a memory and a processor, wherein the memory is used for storing a computer program, and the processor runs the computer program to enable the electronic device to execute the human-computer interaction authority management method.
A computer read-only storage medium storing a computer program which, when executed by a processor, implements the above-described human-computer interaction rights management method.
In order to achieve the purpose, the invention provides the following scheme:
according to the specific embodiment provided by the invention, the invention discloses the following technical effects: the invention provides a man-machine interaction authority management method and a man-machine interaction authority management system, wherein account information of a user is independently stored in a MySQL database, and through carrying out open authority configuration on each host, the criterion granted by the authority is no longer the login user of a host operating system, and the user switching behavior is no longer the user needing to switch the operating system, so that the user switching behavior does not influence other programs operated by the current host, and the free switching of the user in a man-machine interaction interface is realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a flowchart of a man-machine interaction rights management method provided by the present invention;
FIG. 2 is a diagram of hardware of a human-computer interaction rights management system according to the present invention;
fig. 3 is a diagram of a structure of a human-computer interaction rights management system provided by the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a man-machine interaction authority management method and a man-machine interaction authority management system, which can realize free switching of users in a man-machine interaction interface without influencing other programs operated by a current host.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Example one
Fig. 1 is a flowchart of a human-computer interaction right management method provided by the present invention, and as shown in fig. 1, a human-computer interaction right management method includes:
step 101: running EPICS IOC in an IOC server of a control subnet, deploying a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of a user subnet, using a dual-network-card server spanning a network segment of the control subnet and a network segment of the user subnet as a gateway server, deploying a CA gateway and a MySQL database, and storing a user name, a password and an authority group to which a user belongs in the MySQL database by taking the user name as a main key.
In practical application, the control subnet is the network segment a, and the user subnet is the network segment b.
Step 102: developing a matched login window in the human-computer interaction interface, and setting an authority management auxiliary IOC; the login window is linked with the MySQL database; and the authority management auxiliary IOC is used for reading the current login user of each host and the authority group to which the user belongs.
In practical application, in the aspect of a front-end operation host, a matching login window is developed in a matched developed Phoebus human-computer interaction interface, and an Input Output Controller (IOC) for authority management is set.
Step 103: and issuing the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC according to the user name input by the login window, and determining the authority group record process variable corresponding to the current host and the user record process variable corresponding to the current host.
The step 103 further comprises: and verifying the user name and the password input by the login window by utilizing the MySQL database.
In practical application, a login window of a human-computer interaction interface is connected with a MySQL database storing user information, a corresponding password and an authority group to which a user belongs are inquired according to an input user name during login, if the password corresponds to the right, the authority group to which the current host login user belongs is issued to a Process Variable (PV) of a current host corresponding authority group record in an auxiliary IOC, and the current host login user name is issued to a PV of the current host corresponding user record in the auxiliary IOC.
Step 104: in the authority configuration file of the CA gateway, configuring the open authority of each host according to the authority group recording process variable and the user recording process variable; the open permissions include inaccessible, read-only, and writable permissions.
The step 104 further includes: and carrying out permission grade division on the opening permission, so that the low-grade read-only permission reads the numerical value of the process variable opening the low-grade read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC, and the high-grade read-only permission reads the configuration information of the process variable opening the high-grade read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC.
In practical applications, the authority management of a Channel Access (CA) gateway has an operation function, that is, the authority management is determined in real time through operations written in an authority configuration file. The configurable part in the configuration file includes a host (i.e., a front-end computer connected to the gateway and reading data from the gateway) group and a PV group (i.e., PVs of different functions and different devices are distinguished according to groups), so that the open permission of each PV group to different host groups can be configured, including no permission, read-only, read-write, and divided into permission level 0 and permission level 1, for example: a read-only permission at level 0 may read the value of the PV, while a read-only permission at level 1 may read the configuration information of the PV.
In the invention, each host user authority group record PV is used as an operation input quantity in the authority configuration of the gateway, the authority of the current host is controlled by distinguishing the authority group records PV, and the authority groups and the user name have corresponding relation, so that the authority authentication, namely management of user fineness can be realized on the premise of not changing users of a man-machine interaction host system.
Boolean operation can be programmed in the configuration file, and only the value of the PV designated in the IOC is read and the numerical operation and the Boolean operation are carried out, thereby realizing that the opening authority of a certain PV group to each host group is different when the PV is in different numerical value ranges.
The permissions are divided into three levels of inaccessible, read-only and writable permissions, wherein the read-only and writable permissions are divided into two levels of high and low, the high permission allows the host to access all domains of the target PV, and the low permission only allows the host to access the value of the target PV.
PV representing the authority group to which the current login user of each host belongs is introduced in the CA gateway configuration process, and the user name, the password and the authority group to which the user belongs are stored in the MySQL database. And the user inputs a user name and a password on a login interface developed in a front-end man-machine interaction interface of a certain host, the login interface performs identity verification according to the information stored in MySQL, and after the verification is successful, the user name of the current host login and the authority group to which the current host login user belongs are issued to PV. The CA gateway can read the PV indicating the right group to which the user currently logged in to the host belongs, and perform calculation based on the PV value to determine what right each PV group gives to the host at that time.
The invention can realize login and logout of users, user information verification and authority management in a set of human-computer interaction platform developed by Phoebus, provide storage and query of login records, realize user identity verification and read-write authorization of a human-computer interaction interface layer at the front end of an EPICS control system, realize authority differentiation of user groups and provide customized different authority management for different hosts.
Different host machines are endowed with different authority management schemes, namely the same user can read and write the variable 1 on the host machine A, but the variable 1 can only be read and cannot be written on the host machine B, so that the misoperation of the host machines and equipment of other personnel groups by workers is prevented.
Example two
As shown in fig. 2, the rights management system hardware of the present embodiment includes: the system comprises human-computer interaction hosts PC1, PC2, PC3 and PC4, a dual network card gateway server G and an IOC operation server S1, S2, S3 and S4. The network environment of the PC1-4 is a user subnet local area network, the network environment of the S1-4 is a control subnet local area network, and the two network cards of the G are connected across the user subnet and the control subnet.
The PC1-4 deploys a Phoebus platform and a developed human-computer interaction interface; s1-4 deploys an EPICS environment to provide IOC operation support; and G, deploying a MySQL database which can be accessed by the CA gateway and the user subnet, configuring the EPICS PV group and the authority authentication condition of each PV group on each man-machine interaction host to each user group by the CA gateway, and configuring the user name, the password and the affiliated authority group of the account in the database.
The right control implementation of the embodiment includes the following configuration contents:
and carrying out coding configuration on the CA gateway deployed by the dual-network-card gateway server, and defining the authorization authentication condition of each user group by the EPICS PV group and each PV group on each human-computer interaction host.
And the CA communication source is designated as a gateway server in the man-machine interaction platform.
And configuring a user name, a password and an affiliated authority group of the account in MySQL deployed in a human-computer interaction network segment.
And (4) developing a login logout window in the man-machine interaction interface, and connecting a database for reading.
And the IOC is operated in the control subnet, and the man-machine interaction interface in the user subnet realizes user authentication and authority management.
In the embodiment, the PV groups are divided into laser, optical path transmission, target range, beam line and running state display, the user authority groups are user group one, user group two, user group three and management group, wherein PC1-3 belongs to user group one to three, and PC4 belongs to management group. And in the aspect of authority design, the method is divided into inaccessible, read-only and writable, wherein the writable authority comprises read-only authority. All the user group members have all PV group read-only authorities, the tourists which do not log in have running state display read-only authorities, the first user group has laser and optical path transmission writable authorities, the second user group has optical path transmission and shooting range writable authorities, the third user group has beam line writable authorities, and the management group has laser, optical path transmission, shooting range and beam line writable authorities. The user group one, two and three members can only have the writable right after the PC of the group logs in, and only have the read-only right of all PV groups after other PCs log in, and the management group right is not limited by the logged-in PC, as shown in Table 1.
Table 1 table of PC1 login authentication and authority granting
Figure BDA0003958612190000081
And the authority group record PV corresponding to the PC1 is PC1: usrGroup, and the user record PV corresponding to the PC1 is PC1: usr. The value of PC1: usrGroup is 0 when not logged in, and is 1,2,3,4 when user groups 1 to three and the management group are logged in, respectively. And performing authentication operation configuration in the configuration of the CA gateway, wherein the value of the PC1: usrgroup is an authentication standard for the CA gateway to grant the access right to the PC 1. That is, when the PC1: usrGroup =0, the PC1 human-computer interaction interface has no right to access the laser, the light path transmission, the target range and the beam PV, and can read the running state display PV; when the PC1 is UsrGroup =1, the PC1 human-computer interaction interface can write laser and optical path transmission PV, and can read a target range, a beam line and running state display PV; PC1: usrGroup =2,3, the above mentioned groups of PV can be read; when PC1: usrGroup =4, the laser, optical path transmission, range, beam PV can be written, and the operation state display PV can be read.
By recording the change of the value of the PC1: usr, the method can record which person logs in which man-machine interaction host at any time, and plays the roles of authority change log recording and control operation tracing.
The permission configuration mode adopted in this embodiment is as described above, and preferentially ensures the operation permission of the permission group member in the PC of the group, and simultaneously protects the human-computer interaction interface of the group from being operated by other people.
EXAMPLE III
In order to execute a corresponding method of the above embodiments to achieve corresponding functions and technical effects, a human-computer interaction right management system is provided below.
Fig. 3 is a structural diagram of a human-computer interaction right management system provided by the present invention, and as shown in fig. 3, a human-computer interaction right management system includes:
the deployment module 301 is configured to run an EPICS IOC in an IOC server of a control subnet, deploy a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of a user subnet, deploy a CA gateway and a MySQL database by using a dual network card server spanning a network segment of the control subnet and a network segment of the user subnet as a gateway server, and store a user name, a password, and a permission group to which a user belongs in the MySQL database by using the user name as a main key.
An authority management assisted IOC setting and login window linking module 302, configured to develop a matched login window in the human-computer interaction interface, and set an authority management assisted IOC; the login window is linked with the MySQL database; and the authority management auxiliary IOC is used for reading the current login user of each host and the authority group to which the user belongs.
And the process variable recording module 303 is configured to issue, according to the user name input by the login window, the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management assistance IOC, and determine that the authority group corresponding to the current host records the process variable and the user corresponding to the current host records the process variable.
An open authority configuration module 304, configured to configure, in an authority configuration file of the CA gateway, an open authority of each host according to the authority group record process variable and the user record process variable; the open permissions include inaccessible permissions, read-only permissions, and writable permissions.
The invention also includes: and the verification unit is used for verifying the user name and the password input by the login window by utilizing the MySQL database.
The invention also includes: and the permission level division module is used for carrying out permission level division on the opening permission, so that the low-level read-only permission reads the numerical value of the process variable which opens the low-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC, and the high-level read-only permission reads the configuration information of the process variable which opens the high-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the system disclosed by the embodiment, the description is relatively simple because the system corresponds to the method disclosed by the embodiment, and the relevant points can be referred to the method part for description.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.

Claims (6)

1. A human-computer interaction authority management method is characterized by comprising the following steps:
running EPICS IOC in an IOC server of a control subnet, deploying a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of a user subnet, using a dual-network-card server spanning a network segment of the control subnet and a network segment of the user subnet as a gateway server, deploying a CA gateway and a MySQL database, and storing a user name, a password and an authority group to which a user belongs in the MySQL database by taking the user name as a main key;
developing a matched login window in the human-computer interaction interface, and setting an authority management auxiliary IOC; the login window is linked with the MySQL database; the authority management auxiliary IOC is used for reading current login users of all the hosts and authority groups to which the users belong;
according to the user name input by the login window, issuing the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC, and determining the authority group record process variable corresponding to the current host and the user record process variable corresponding to the current host;
in the authority configuration file of the CA gateway, configuring the open authority of each host according to the authority group recording process variable and the user recording process variable; the open permissions include inaccessible permissions, read-only permissions, and writable permissions.
2. The human-computer interaction authority management method according to claim 1, wherein the method, according to the user name input by the login window, issues an authority group to which a user of a login user of a current host belongs and the user name of the login user to the authority management assistance IOC, and determines an authority group recording process variable corresponding to the current host and a user recording process variable corresponding to the current host, and before that, further includes:
and verifying the user name and the password input by the login window by utilizing the MySQL database.
3. The human-computer interaction authority management method according to claim 1, wherein the configuring, in the authority configuration file of the CA gateway, the open authority of each host according to the authority group recording process variable and the user recording process variable further comprises:
and carrying out permission level division on the opening permission, so that the low-level read-only permission reads the numerical value of the process variable which opens the low-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC, and the high-level read-only permission reads the configuration information of the process variable which opens the high-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC.
4. A human-computer interaction rights management system, comprising:
the system comprises a deployment module, a network management module and a user sub-network management module, wherein the deployment module is used for operating EPICS IOC in an IOC server of a control sub-network, deploying a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of a user sub-network, deploying a CA gateway and a MySQL database by using a dual-network card server spanning a network segment of the control sub-network and a network segment of the user sub-network as a gateway server, and storing a user name, a password and a permission group to which a user belongs in the MySQL database by using the user name as a main key;
the permission management auxiliary IOC setting and login window linking module is used for developing a matched login window in the human-computer interaction interface and setting the permission management auxiliary IOC; the login window is linked with the MySQL database; the authority management auxiliary IOC is used for reading current login users of all the hosts and authority groups to which the users belong;
the process variable recording module is used for issuing the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC according to the user name input by the login window, and determining the authority group record process variable corresponding to the current host and the user record process variable corresponding to the current host;
the open authority configuration module is used for configuring the open authority of each host according to the authority group recording process variable and the user recording process variable in the authority configuration file of the CA gateway; the open permissions include inaccessible, read-only, and writable permissions.
5. The human-computer interaction rights management system of claim 4, further comprising:
and the verification unit is used for verifying the user name and the password input by the login window by utilizing the MySQL database.
6. The human-computer interaction rights management system of claim 4, further comprising:
and the permission level division module is used for carrying out permission level division on the opening permission, so that the low-level read-only permission reads the numerical value of the process variable which opens the low-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC, and the high-level read-only permission reads the configuration information of the process variable which opens the high-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC.
CN202211471403.5A 2022-11-23 2022-11-23 Human-computer interaction authority management method and system based on EPICS Pending CN115859233A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211471403.5A CN115859233A (en) 2022-11-23 2022-11-23 Human-computer interaction authority management method and system based on EPICS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211471403.5A CN115859233A (en) 2022-11-23 2022-11-23 Human-computer interaction authority management method and system based on EPICS

Publications (1)

Publication Number Publication Date
CN115859233A true CN115859233A (en) 2023-03-28

Family

ID=85665191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211471403.5A Pending CN115859233A (en) 2022-11-23 2022-11-23 Human-computer interaction authority management method and system based on EPICS

Country Status (1)

Country Link
CN (1) CN115859233A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117667288A (en) * 2023-12-08 2024-03-08 安徽大学 EPICS-based front-end control method for large scientific device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117667288A (en) * 2023-12-08 2024-03-08 安徽大学 EPICS-based front-end control method for large scientific device

Similar Documents

Publication Publication Date Title
US20080022376A1 (en) System and method for hardware access control
CN100507775C (en) Programming device of programmable controller
CN105141614B (en) A kind of access right control method and device of movable storage device
CN105324750A (en) Development-environment system, development-environment device, and development-environment provision method and program
KR100863461B1 (en) Approval system in network for the data preservation
KR910010337A (en) Method and apparatus for dynamic management of I / O connection
SE526829C2 (en) Arrangements, motor vehicles, ways and computer programs to provide access to electronic controllers
DE102020127800A1 (en) SINGLE CHIP SYSTEM AND PROCEDURE FOR ITS OPERATION
CN115859233A (en) Human-computer interaction authority management method and system based on EPICS
CN104425001A (en) System for simultaneously burning multiple switches, method thereof and corresponding switches
CN107026825A (en) A kind of method and system for accessing big data system
CN104462937B (en) Operating system peripheral access permission control method based on users
KR20080053822A (en) Control system to control the document being taken out
CN102194078A (en) Method and system for security of file input and output of application programs
CN106815503A (en) A kind of operating system method for managing user right and system
CN100583119C (en) Mobile memory and method for controlling data download of computer
CN105760746A (en) Authority management method, authority distribution method and equipment
CN107111511A (en) Access control method, device and system
CN111813725A (en) Computer equipment, serial port connection method, system and related equipment
KR101195292B1 (en) Apparatus and method for managing identity
CN115694943B (en) Behavior-based dynamic forced access control method, system and medium for operating system
CN109284629B (en) Authority control method and system of distributed file storage system
JP4390263B2 (en) Visualization display method of process access authority in secure OS
CN1219257C (en) Safety system used of computer data storage and transmission
CN115718666A (en) Fine-grained dynamic authority control method and system for WEB service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination