Equipment control method, device, server and system

A device control and server technology, applied in the field of device control methods, devices and servers, can solve problems such as potential safety hazards and data leakage, and achieve the effects of preventing security vulnerabilities, reducing energy consumption, and preventing experimental data leakage

Inactive Publication Date: 2018-06-08
FOSHAN HUANYUN TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides an equipment control method, device, server, and system to s...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment control method, device, server and system
  • Equipment control method, device, server and system
  • Equipment control method, device, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0099] Such as figure 1 As shown, according to an aspect of the embodiments of the present invention, a device control method is provided, the method comprising:

[0100] S100: Obtain authentication information and judge whether the user has the right to use the device at the current time according to the authentication information, the authentication information including user name, password, and device identification;

[0101] S200: If the user has the right to use the device at the current time, allocate a virtual machine installed with a control program corresponding to the device to the user;

[0102] S300: Start the virtual machine installed with the control program.

[0103] Specifically, the authentication information of the user is obtained, and the authentication information includes user name, password, and device identification; according to the authentication information, it is queried whether the user has the right to use the device corresponding to the device i...

specific Embodiment approach

[0148] Specifically, a specific implementation manner of the method includes:

[0149] Obtain authentication information, where the authentication information includes a user name, password, and device identification;

[0150] judging whether the user is a legal user according to the authentication information;

[0151] If the user is a legal user, determine whether the user has the right to use the device at the current time;

[0152] If the user has the right to use the device at the current time, determine whether the user has a corresponding virtual machine;

[0153] If the user has a corresponding virtual machine, determine whether the control program is installed in the virtual machine corresponding to the user;

[0154]If the control program corresponding to the device is not installed in the virtual machine corresponding to the user, determine whether the virtual machine operating system corresponding to the user is compatible with the control program;

[0155] If t...

Embodiment 2

[0165] Such as Figure 9 As shown, according to an aspect of yet another embodiment of the present invention, an equipment control device is provided, the device comprising:

[0166] Judging module 201, configured to obtain authentication information and judge whether the user has the right to use the device at the current time according to the authentication information, the authentication information including user name, password, and device identification;

[0167] An allocation module 202, configured to allocate a virtual machine installed with a control program corresponding to the device to the user if the user has the right to use the device at the current time;

[0168] The starting module 203 is configured to start the virtual machine installed with the control program.

[0169] When users use the device control program in the virtual machine, they do not need to arrange a physical machine on the laboratory site, but only need to connect to the virtual machine throug...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an equipment control method. Authentication information is acquired, whether a user has use authority of equipment at current time is judged according to the authentication information, and the authentication information includes a user name, a password and an equipment identifier; a virtual machine provided with a control program, which corresponds to equipment, is allocated for the user if the user has the equipment use authority at the current time; and the virtual machine provided with the control program is started. The method solves the problem that security hidden-troubles of data leakage exist in operations of using physical machines to control experiment equipment in the prior art. The equipment control method and an equipment control device, server and system of realizing data isolation and ensuring data security are provided.

Description

technical field [0001] The present invention relates to the field of equipment control, in particular, to an equipment control method, device and server. Background technique [0002] At present, with the development of informatization of experimental equipment, experimenters can control the operation of experimental equipment and read instrument data on the computer, without the need to manually operate on the panel and read the data on the panel display. Generally, the computer corresponding to the experimental equipment is installed with the control program of the equipment. The computer that controls the experimental equipment stores a large amount of experimental data. If you do not pay attention to the deletion of data, it is easy to cause the leakage of experimental data. After files are deleted in the operating system, they can often be recovered with the help of some data recovery tools, but complete data isolation is not actually achieved. At present, colleges an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/53
CPCG06F21/31G06F21/53
Inventor 吴家隐杨默谢轩仲
Owner FOSHAN HUANYUN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products