CN115859233A - Human-computer interaction authority management method and system based on EPICS - Google Patents
Human-computer interaction authority management method and system based on EPICS Download PDFInfo
- Publication number
- CN115859233A CN115859233A CN202211471403.5A CN202211471403A CN115859233A CN 115859233 A CN115859233 A CN 115859233A CN 202211471403 A CN202211471403 A CN 202211471403A CN 115859233 A CN115859233 A CN 115859233A
- Authority
- CN
- China
- Prior art keywords
- user
- authority
- permission
- login
- ioc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Computer And Data Communications (AREA)
Abstract
The invention relates to a man-machine interaction authority management method and a man-machine interaction authority management system. The method comprises the following steps: running EPICSIOC in an IOC server of a control subnet, deploying a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of a user subnet, determining a gateway server, and deploying a CA gateway and a MySQL database; developing a matched login window in a human-computer interaction interface, and setting an authority management auxiliary IOC; according to the user name input by the login window, issuing the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC, and determining the authority group recording process variable corresponding to the current host and the user recording process variable corresponding to the current host; and in the authority configuration file of the CA gateway, configuring the open authority of each host according to the authority group recording process variable and the user recording process variable. The invention can not influence other programs operated by the current host computer when the user switches the behavior.
Description
Technical Field
The invention relates to the field of human-computer interaction authority management, in particular to a human-computer interaction authority management method and system based on control system application developed in an EPICS environment.
Background
Large scientific devices such as laser accelerators have the characteristics of more equipment, complex subsystems, more workers and experimenters and the like. Based on the complexity of the system, corresponding authority control needs to be carried out on the operation of personnel in the debugging and using processes of the device, and system faults, equipment damage and the like caused by misoperation are prevented. The operator authority is managed by dividing different operation levels, and the management mode is divided into horizontal authority division and longitudinal authority division, wherein the former means division aiming at different equipment areas of an accelerator device, and the latter means division aiming at different personnel group operation levels in the same area.
Experimental Physics and Industrial Control System (EPICS) is a commonly used architecture of a large scientific device Control System, data is released in the form of Process Variables (PV), and a basic access mechanism of the System is a channel access mechanism called Channel Access (CA) established on top of TCP/IP protocol. Phoebus is a human-computer interaction interface development tool of EPICS. In the architecture, under the requirement that the operation of an Input Output Controller (IOC) is not influenced and only a frontmost human-computer interaction layer is managed, the isolation and access authority of a network segment can be controlled by deploying a CA gateway across the network segment to a host where a human-computer interaction interface is located, so that a general user of a control system cannot directly modify a lower-layer program and a variable.
The management of the CA gateway to the authority is based on three judgments: and judging the access request source host, the current user of the access source host and the current running time. The first one is verified through the name of the host of the source of the capture request, the second one is verified through the current account of the operating system of the host of the source of the capture request, and the third one is judged in real time through the operation written in the authority configuration file. However, in order to realize the functions of user authentication and authority management, the development goal of the authority management system is to realize authority management of user fineness and to realize login, logout and real-time authority change of a user in a set of human-computer interaction interfaces developed based on Phoebus. The CA gateway captures the user judgment mode of the current user from the host operating system, so that account switching needs to be performed through host operating system user switching, the program operated by the current host is influenced, the target of free switching of the users in the human-computer interaction interface cannot be realized, the CA gateway is not suitable for application scenes of different hosts switched by the same user, and the corresponding design requirements cannot be met.
Disclosure of Invention
The invention aims to provide a man-machine interaction authority management method and a man-machine interaction authority management system, which are used for solving the problems that the current program operated by a host computer is influenced by user switching, and users in a man-machine interaction interface cannot be freely switched.
A man-machine interaction authority management method comprises the following steps:
running EPICS IOC in an IOC server of a control subnet, deploying a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of a user subnet, using a dual-network-card server spanning a network segment of the control subnet and a network segment of the user subnet as a gateway server, deploying a CA gateway and a MySQL database, and storing a user name, a password and an authority group to which a user belongs in the MySQL database by taking the user name as a main key;
developing a matched login window in the human-computer interaction interface, and setting an authority management auxiliary IOC; the login window is linked with the MySQL database; the authority management auxiliary IOC is used for reading current login users of all the hosts and authority groups to which the users belong;
according to the user name input by the login window, issuing the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC, and determining the authority group record process variable corresponding to the current host and the user record process variable corresponding to the current host;
in the authority configuration file of the CA gateway, configuring the open authority of each host according to the authority group recording process variable and the user recording process variable; the open permissions include inaccessible, read-only, and writable permissions.
Optionally, the issuing, according to the user name input in the login window, the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC, and determining the authority group recording process variable corresponding to the current host and the user recording process variable corresponding to the current host, before further including:
and verifying the user name and the password input by the login window by utilizing the MySQL database.
Optionally, configuring, in the authority configuration file of the CA gateway, the open authority of each host according to the authority group recording process variable and the user recording process variable, and then further including:
and carrying out permission level division on the opening permission, so that the low-level read-only permission reads the numerical value of the process variable which opens the low-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC, and the high-level read-only permission reads the configuration information of the process variable which opens the high-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC.
A human-computer interaction rights management system comprising:
the deployment module is used for operating EPICS IOC in an IOC server of the control subnet, deploying a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of the user subnet, using a dual network card server spanning a network segment of the control subnet and a network segment of the user subnet as a gateway server, deploying a CA gateway and a MySQL database, and storing a user name, a password and a permission group to which the user belongs in the MySQL database by taking the user name as a main key;
the authority management auxiliary IOC setting and login window linking module is used for developing a matched login window in the human-computer interaction interface and setting the authority management auxiliary IOC; the login window is linked with the MySQL database; the authority management auxiliary IOC is used for reading current login users of all the hosts and authority groups to which the users belong;
the process variable recording module is used for issuing the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC according to the user name input by the login window, and determining the authority group record process variable corresponding to the current host and the user record process variable corresponding to the current host;
the open authority configuration module is used for configuring the open authority of each host according to the authority group record process variable and the user record process variable in an authority configuration file of the CA gateway; the open permissions include inaccessible, read-only, and writable permissions.
Optionally, the method further includes:
and the verification unit is used for verifying the user name and the password input by the login window by utilizing the MySQL database.
Optionally, the method further includes:
and the permission level division module is used for carrying out permission level division on the opening permission, so that the low-level read-only permission reads the numerical value of the process variable which opens the low-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC, and the high-level read-only permission reads the configuration information of the process variable which opens the high-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC.
An electronic device comprises a memory and a processor, wherein the memory is used for storing a computer program, and the processor runs the computer program to enable the electronic device to execute the human-computer interaction authority management method.
A computer read-only storage medium storing a computer program which, when executed by a processor, implements the above-described human-computer interaction rights management method.
In order to achieve the purpose, the invention provides the following scheme:
according to the specific embodiment provided by the invention, the invention discloses the following technical effects: the invention provides a man-machine interaction authority management method and a man-machine interaction authority management system, wherein account information of a user is independently stored in a MySQL database, and through carrying out open authority configuration on each host, the criterion granted by the authority is no longer the login user of a host operating system, and the user switching behavior is no longer the user needing to switch the operating system, so that the user switching behavior does not influence other programs operated by the current host, and the free switching of the user in a man-machine interaction interface is realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a flowchart of a man-machine interaction rights management method provided by the present invention;
FIG. 2 is a diagram of hardware of a human-computer interaction rights management system according to the present invention;
fig. 3 is a diagram of a structure of a human-computer interaction rights management system provided by the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a man-machine interaction authority management method and a man-machine interaction authority management system, which can realize free switching of users in a man-machine interaction interface without influencing other programs operated by a current host.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Example one
Fig. 1 is a flowchart of a human-computer interaction right management method provided by the present invention, and as shown in fig. 1, a human-computer interaction right management method includes:
step 101: running EPICS IOC in an IOC server of a control subnet, deploying a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of a user subnet, using a dual-network-card server spanning a network segment of the control subnet and a network segment of the user subnet as a gateway server, deploying a CA gateway and a MySQL database, and storing a user name, a password and an authority group to which a user belongs in the MySQL database by taking the user name as a main key.
In practical application, the control subnet is the network segment a, and the user subnet is the network segment b.
Step 102: developing a matched login window in the human-computer interaction interface, and setting an authority management auxiliary IOC; the login window is linked with the MySQL database; and the authority management auxiliary IOC is used for reading the current login user of each host and the authority group to which the user belongs.
In practical application, in the aspect of a front-end operation host, a matching login window is developed in a matched developed Phoebus human-computer interaction interface, and an Input Output Controller (IOC) for authority management is set.
Step 103: and issuing the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC according to the user name input by the login window, and determining the authority group record process variable corresponding to the current host and the user record process variable corresponding to the current host.
The step 103 further comprises: and verifying the user name and the password input by the login window by utilizing the MySQL database.
In practical application, a login window of a human-computer interaction interface is connected with a MySQL database storing user information, a corresponding password and an authority group to which a user belongs are inquired according to an input user name during login, if the password corresponds to the right, the authority group to which the current host login user belongs is issued to a Process Variable (PV) of a current host corresponding authority group record in an auxiliary IOC, and the current host login user name is issued to a PV of the current host corresponding user record in the auxiliary IOC.
Step 104: in the authority configuration file of the CA gateway, configuring the open authority of each host according to the authority group recording process variable and the user recording process variable; the open permissions include inaccessible, read-only, and writable permissions.
The step 104 further includes: and carrying out permission grade division on the opening permission, so that the low-grade read-only permission reads the numerical value of the process variable opening the low-grade read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC, and the high-grade read-only permission reads the configuration information of the process variable opening the high-grade read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC.
In practical applications, the authority management of a Channel Access (CA) gateway has an operation function, that is, the authority management is determined in real time through operations written in an authority configuration file. The configurable part in the configuration file includes a host (i.e., a front-end computer connected to the gateway and reading data from the gateway) group and a PV group (i.e., PVs of different functions and different devices are distinguished according to groups), so that the open permission of each PV group to different host groups can be configured, including no permission, read-only, read-write, and divided into permission level 0 and permission level 1, for example: a read-only permission at level 0 may read the value of the PV, while a read-only permission at level 1 may read the configuration information of the PV.
In the invention, each host user authority group record PV is used as an operation input quantity in the authority configuration of the gateway, the authority of the current host is controlled by distinguishing the authority group records PV, and the authority groups and the user name have corresponding relation, so that the authority authentication, namely management of user fineness can be realized on the premise of not changing users of a man-machine interaction host system.
Boolean operation can be programmed in the configuration file, and only the value of the PV designated in the IOC is read and the numerical operation and the Boolean operation are carried out, thereby realizing that the opening authority of a certain PV group to each host group is different when the PV is in different numerical value ranges.
The permissions are divided into three levels of inaccessible, read-only and writable permissions, wherein the read-only and writable permissions are divided into two levels of high and low, the high permission allows the host to access all domains of the target PV, and the low permission only allows the host to access the value of the target PV.
PV representing the authority group to which the current login user of each host belongs is introduced in the CA gateway configuration process, and the user name, the password and the authority group to which the user belongs are stored in the MySQL database. And the user inputs a user name and a password on a login interface developed in a front-end man-machine interaction interface of a certain host, the login interface performs identity verification according to the information stored in MySQL, and after the verification is successful, the user name of the current host login and the authority group to which the current host login user belongs are issued to PV. The CA gateway can read the PV indicating the right group to which the user currently logged in to the host belongs, and perform calculation based on the PV value to determine what right each PV group gives to the host at that time.
The invention can realize login and logout of users, user information verification and authority management in a set of human-computer interaction platform developed by Phoebus, provide storage and query of login records, realize user identity verification and read-write authorization of a human-computer interaction interface layer at the front end of an EPICS control system, realize authority differentiation of user groups and provide customized different authority management for different hosts.
Different host machines are endowed with different authority management schemes, namely the same user can read and write the variable 1 on the host machine A, but the variable 1 can only be read and cannot be written on the host machine B, so that the misoperation of the host machines and equipment of other personnel groups by workers is prevented.
Example two
As shown in fig. 2, the rights management system hardware of the present embodiment includes: the system comprises human-computer interaction hosts PC1, PC2, PC3 and PC4, a dual network card gateway server G and an IOC operation server S1, S2, S3 and S4. The network environment of the PC1-4 is a user subnet local area network, the network environment of the S1-4 is a control subnet local area network, and the two network cards of the G are connected across the user subnet and the control subnet.
The PC1-4 deploys a Phoebus platform and a developed human-computer interaction interface; s1-4 deploys an EPICS environment to provide IOC operation support; and G, deploying a MySQL database which can be accessed by the CA gateway and the user subnet, configuring the EPICS PV group and the authority authentication condition of each PV group on each man-machine interaction host to each user group by the CA gateway, and configuring the user name, the password and the affiliated authority group of the account in the database.
The right control implementation of the embodiment includes the following configuration contents:
and carrying out coding configuration on the CA gateway deployed by the dual-network-card gateway server, and defining the authorization authentication condition of each user group by the EPICS PV group and each PV group on each human-computer interaction host.
And the CA communication source is designated as a gateway server in the man-machine interaction platform.
And configuring a user name, a password and an affiliated authority group of the account in MySQL deployed in a human-computer interaction network segment.
And (4) developing a login logout window in the man-machine interaction interface, and connecting a database for reading.
And the IOC is operated in the control subnet, and the man-machine interaction interface in the user subnet realizes user authentication and authority management.
In the embodiment, the PV groups are divided into laser, optical path transmission, target range, beam line and running state display, the user authority groups are user group one, user group two, user group three and management group, wherein PC1-3 belongs to user group one to three, and PC4 belongs to management group. And in the aspect of authority design, the method is divided into inaccessible, read-only and writable, wherein the writable authority comprises read-only authority. All the user group members have all PV group read-only authorities, the tourists which do not log in have running state display read-only authorities, the first user group has laser and optical path transmission writable authorities, the second user group has optical path transmission and shooting range writable authorities, the third user group has beam line writable authorities, and the management group has laser, optical path transmission, shooting range and beam line writable authorities. The user group one, two and three members can only have the writable right after the PC of the group logs in, and only have the read-only right of all PV groups after other PCs log in, and the management group right is not limited by the logged-in PC, as shown in Table 1.
Table 1 table of PC1 login authentication and authority granting
And the authority group record PV corresponding to the PC1 is PC1: usrGroup, and the user record PV corresponding to the PC1 is PC1: usr. The value of PC1: usrGroup is 0 when not logged in, and is 1,2,3,4 when user groups 1 to three and the management group are logged in, respectively. And performing authentication operation configuration in the configuration of the CA gateway, wherein the value of the PC1: usrgroup is an authentication standard for the CA gateway to grant the access right to the PC 1. That is, when the PC1: usrGroup =0, the PC1 human-computer interaction interface has no right to access the laser, the light path transmission, the target range and the beam PV, and can read the running state display PV; when the PC1 is UsrGroup =1, the PC1 human-computer interaction interface can write laser and optical path transmission PV, and can read a target range, a beam line and running state display PV; PC1: usrGroup =2,3, the above mentioned groups of PV can be read; when PC1: usrGroup =4, the laser, optical path transmission, range, beam PV can be written, and the operation state display PV can be read.
By recording the change of the value of the PC1: usr, the method can record which person logs in which man-machine interaction host at any time, and plays the roles of authority change log recording and control operation tracing.
The permission configuration mode adopted in this embodiment is as described above, and preferentially ensures the operation permission of the permission group member in the PC of the group, and simultaneously protects the human-computer interaction interface of the group from being operated by other people.
EXAMPLE III
In order to execute a corresponding method of the above embodiments to achieve corresponding functions and technical effects, a human-computer interaction right management system is provided below.
Fig. 3 is a structural diagram of a human-computer interaction right management system provided by the present invention, and as shown in fig. 3, a human-computer interaction right management system includes:
the deployment module 301 is configured to run an EPICS IOC in an IOC server of a control subnet, deploy a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of a user subnet, deploy a CA gateway and a MySQL database by using a dual network card server spanning a network segment of the control subnet and a network segment of the user subnet as a gateway server, and store a user name, a password, and a permission group to which a user belongs in the MySQL database by using the user name as a main key.
An authority management assisted IOC setting and login window linking module 302, configured to develop a matched login window in the human-computer interaction interface, and set an authority management assisted IOC; the login window is linked with the MySQL database; and the authority management auxiliary IOC is used for reading the current login user of each host and the authority group to which the user belongs.
And the process variable recording module 303 is configured to issue, according to the user name input by the login window, the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management assistance IOC, and determine that the authority group corresponding to the current host records the process variable and the user corresponding to the current host records the process variable.
An open authority configuration module 304, configured to configure, in an authority configuration file of the CA gateway, an open authority of each host according to the authority group record process variable and the user record process variable; the open permissions include inaccessible permissions, read-only permissions, and writable permissions.
The invention also includes: and the verification unit is used for verifying the user name and the password input by the login window by utilizing the MySQL database.
The invention also includes: and the permission level division module is used for carrying out permission level division on the opening permission, so that the low-level read-only permission reads the numerical value of the process variable which opens the low-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC, and the high-level read-only permission reads the configuration information of the process variable which opens the high-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the system disclosed by the embodiment, the description is relatively simple because the system corresponds to the method disclosed by the embodiment, and the relevant points can be referred to the method part for description.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.
Claims (6)
1. A human-computer interaction authority management method is characterized by comprising the following steps:
running EPICS IOC in an IOC server of a control subnet, deploying a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of a user subnet, using a dual-network-card server spanning a network segment of the control subnet and a network segment of the user subnet as a gateway server, deploying a CA gateway and a MySQL database, and storing a user name, a password and an authority group to which a user belongs in the MySQL database by taking the user name as a main key;
developing a matched login window in the human-computer interaction interface, and setting an authority management auxiliary IOC; the login window is linked with the MySQL database; the authority management auxiliary IOC is used for reading current login users of all the hosts and authority groups to which the users belong;
according to the user name input by the login window, issuing the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC, and determining the authority group record process variable corresponding to the current host and the user record process variable corresponding to the current host;
in the authority configuration file of the CA gateway, configuring the open authority of each host according to the authority group recording process variable and the user recording process variable; the open permissions include inaccessible permissions, read-only permissions, and writable permissions.
2. The human-computer interaction authority management method according to claim 1, wherein the method, according to the user name input by the login window, issues an authority group to which a user of a login user of a current host belongs and the user name of the login user to the authority management assistance IOC, and determines an authority group recording process variable corresponding to the current host and a user recording process variable corresponding to the current host, and before that, further includes:
and verifying the user name and the password input by the login window by utilizing the MySQL database.
3. The human-computer interaction authority management method according to claim 1, wherein the configuring, in the authority configuration file of the CA gateway, the open authority of each host according to the authority group recording process variable and the user recording process variable further comprises:
and carrying out permission level division on the opening permission, so that the low-level read-only permission reads the numerical value of the process variable which opens the low-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC, and the high-level read-only permission reads the configuration information of the process variable which opens the high-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC.
4. A human-computer interaction rights management system, comprising:
the system comprises a deployment module, a network management module and a user sub-network management module, wherein the deployment module is used for operating EPICS IOC in an IOC server of a control sub-network, deploying a human-computer interaction interface developed based on Phoebus in a human-computer interaction host of a user sub-network, deploying a CA gateway and a MySQL database by using a dual-network card server spanning a network segment of the control sub-network and a network segment of the user sub-network as a gateway server, and storing a user name, a password and a permission group to which a user belongs in the MySQL database by using the user name as a main key;
the permission management auxiliary IOC setting and login window linking module is used for developing a matched login window in the human-computer interaction interface and setting the permission management auxiliary IOC; the login window is linked with the MySQL database; the authority management auxiliary IOC is used for reading current login users of all the hosts and authority groups to which the users belong;
the process variable recording module is used for issuing the authority group to which the user of the login user of the current host belongs and the user name of the login user to the authority management auxiliary IOC according to the user name input by the login window, and determining the authority group record process variable corresponding to the current host and the user record process variable corresponding to the current host;
the open authority configuration module is used for configuring the open authority of each host according to the authority group recording process variable and the user recording process variable in the authority configuration file of the CA gateway; the open permissions include inaccessible, read-only, and writable permissions.
5. The human-computer interaction rights management system of claim 4, further comprising:
and the verification unit is used for verifying the user name and the password input by the login window by utilizing the MySQL database.
6. The human-computer interaction rights management system of claim 4, further comprising:
and the permission level division module is used for carrying out permission level division on the opening permission, so that the low-level read-only permission reads the numerical value of the process variable which opens the low-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC, and the high-level read-only permission reads the configuration information of the process variable which opens the high-level read-only permission to the login user and the permission group to which the user belongs in the EPICS IOC.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211471403.5A CN115859233A (en) | 2022-11-23 | 2022-11-23 | Human-computer interaction authority management method and system based on EPICS |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211471403.5A CN115859233A (en) | 2022-11-23 | 2022-11-23 | Human-computer interaction authority management method and system based on EPICS |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115859233A true CN115859233A (en) | 2023-03-28 |
Family
ID=85665191
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211471403.5A Pending CN115859233A (en) | 2022-11-23 | 2022-11-23 | Human-computer interaction authority management method and system based on EPICS |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115859233A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117667288A (en) * | 2023-12-08 | 2024-03-08 | 安徽大学 | EPICS-based front-end control method for large scientific device |
-
2022
- 2022-11-23 CN CN202211471403.5A patent/CN115859233A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117667288A (en) * | 2023-12-08 | 2024-03-08 | 安徽大学 | EPICS-based front-end control method for large scientific device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080022376A1 (en) | System and method for hardware access control | |
CN100507775C (en) | Programming device of programmable controller | |
CN105141614B (en) | A kind of access right control method and device of movable storage device | |
CN105324750A (en) | Development-environment system, development-environment device, and development-environment provision method and program | |
KR100863461B1 (en) | Approval system in network for the data preservation | |
KR910010337A (en) | Method and apparatus for dynamic management of I / O connection | |
SE526829C2 (en) | Arrangements, motor vehicles, ways and computer programs to provide access to electronic controllers | |
DE102020127800A1 (en) | SINGLE CHIP SYSTEM AND PROCEDURE FOR ITS OPERATION | |
CN115859233A (en) | Human-computer interaction authority management method and system based on EPICS | |
CN104425001A (en) | System for simultaneously burning multiple switches, method thereof and corresponding switches | |
CN107026825A (en) | A kind of method and system for accessing big data system | |
CN104462937B (en) | Operating system peripheral access permission control method based on users | |
KR20080053822A (en) | Control system to control the document being taken out | |
CN102194078A (en) | Method and system for security of file input and output of application programs | |
CN106815503A (en) | A kind of operating system method for managing user right and system | |
CN100583119C (en) | Mobile memory and method for controlling data download of computer | |
CN105760746A (en) | Authority management method, authority distribution method and equipment | |
CN107111511A (en) | Access control method, device and system | |
CN111813725A (en) | Computer equipment, serial port connection method, system and related equipment | |
KR101195292B1 (en) | Apparatus and method for managing identity | |
CN115694943B (en) | Behavior-based dynamic forced access control method, system and medium for operating system | |
CN109284629B (en) | Authority control method and system of distributed file storage system | |
JP4390263B2 (en) | Visualization display method of process access authority in secure OS | |
CN1219257C (en) | Safety system used of computer data storage and transmission | |
CN115718666A (en) | Fine-grained dynamic authority control method and system for WEB service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |