Safety operation device and method taking safety criteria as working process auditing standards

A workflow and safe operation technology, applied in the direction of digital data authentication, etc., can solve the problem that the human brain cannot remember security events

Active Publication Date: 2013-12-04
陈飞 +1
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to overcome the shortcoming that the operation right of many devices in the prior art depends on the memory of authentication information by the human brain, and the human brain cannot remember too many security events. The use of various types of equipment requiring login authentication is in compliance with safety standards, and safety operation devices and methods with safety standards as the workflow audit standard

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety operation device and method taking safety criteria as working process auditing standards

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described below through specific embodiments.

[0034] refer to figure 1 , a safety operation device with safety rules as the workflow audit standard, which is applied to equipment that needs to input login authentication information. The device is proposed by the operator to use the work process, and based on the safety rule, it automatically judges the compliance of these work processes , and then perform these operations on behalf of the operator. The operating right of this type of equipment is reviewed by the structured device described in the present invention and operated instead of the operator, which avoids the safety hazards caused by the illegal operation of the operator after obtaining the operating right or the fraudulent use of the operator after the authentication information is lost. event.

[0035] Specifically include the following:

[0036] The safety criterion input device 1 is used to input the safety criteri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are a safety operation device and method taking safety criteria as working process auditing standards. The safety operation device comprises a safety criterion input device, a safety criterion storage device, a working process input device, a working process decomposing and auditing device, an approved working process storage device, a working process execution sequence generating device, an operation execution device and the like. The safety operation device is applied to devices needing input of login authentication information, operation rights of the devices are audited by a structured device, the structured device replaces operators in operation, and the safety operation device avoids illegal operation of the operators obtaining the operation rights or safety incidents caused by illegal use of others after loss of the authentication information of the operators.

Description

technical field [0001] The invention relates to a safety operation device and method using safety rules as workflow audit standards, which are applied to various devices that need to log in authentication information. Background technique [0002] In production and life, people are increasingly using various devices to improve convenience and efficiency. Many of these devices have a decisive impact on the safety of production and life, and the operation of these devices depends on the human brain. The memory of authentication information is a very big security risk. Because most people can't remember too many security events. For example, the theft of the website administrator's password leads to tampering with the content of the website, the theft of the management system password leads to information loss, the theft of the password of the mechanical combination lock leads to the failure of the combination lock, etc. Contents of the invention [0003] The main purpose o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06F21/44
Inventor 陈飞
Owner 陈飞
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products