Shield tunneling machine authorization management method and system and storage medium
A technology of authorization management and shield machine, which is applied in the fields of electrical digital data processing, internal/peripheral computer component protection, instruments, etc., can solve the problems of high maintenance cost and poor authorization effect, and achieve labor cost reduction, safety management, and improvement The effect of authorization effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] figure 1 It is a schematic structural diagram of a shield machine authorization management system provided according to an embodiment of the present application, such as figure 1 As shown, can include:
[0030] The machine code generation module 101 is used to generate the corresponding machine code of the shield machine industrial computer according to the CPU hardware serial number of the shield machine industrial computer;
[0031] The decryption module 102 is used to obtain the password generated according to the machine code, and decrypt the password to obtain the start time and the longest available days;
[0032] Timing and counting module 103, used for counting down according to the start time and the longest available days;
[0033] Reminder warning module 104, for when the countdown is less than the time threshold, prompting;
[0034] The screen lock module 105 is configured to lock the screen of the industrial computer when the countdown reaches zero.
[...
Embodiment 2
[0059] figure 2 It is a schematic flowchart of a shield machine authorization management method provided according to an embodiment of the present application, such as figure 2 As shown, the method may include:
[0060] Step 201, generate the machine code corresponding to the shield machine industrial computer according to the CPU hardware serial number of the shield machine industrial computer;
[0061] Step 202, obtain the password generated according to the machine code, and decrypt the password to obtain the start time and the longest available days;
[0062] Step 203, counting down according to the start time and the longest available days;
[0063] Step 204, when the countdown is less than the time threshold, prompting;
[0064] Step 205, when the countdown is zero, lock the screen of the industrial computer.
[0065] Wherein, the method for generating the machine code corresponding to the shield machine industrial computer according to the CPU hardware serial numb...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

