Unlock instant, AI-driven research and patent intelligence for your innovation.

Shield tunneling machine authorization management method and system and storage medium

A technology of authorization management and shield machine, which is applied in the fields of electrical digital data processing, internal/peripheral computer component protection, instruments, etc., can solve the problems of high maintenance cost and poor authorization effect, and achieve labor cost reduction, safety management, and improvement The effect of authorization effect

Pending Publication Date: 2022-04-15
CHINA RAILWEY ENG SERVICE CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present application provides a shield machine authorization management method, system and storage medium to at least solve the technical problems of labor costs, high maintenance costs and poor authorization effects in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shield tunneling machine authorization management method and system and storage medium
  • Shield tunneling machine authorization management method and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] figure 1 It is a schematic structural diagram of a shield machine authorization management system provided according to an embodiment of the present application, such as figure 1 As shown, can include:

[0030] The machine code generation module 101 is used to generate the corresponding machine code of the shield machine industrial computer according to the CPU hardware serial number of the shield machine industrial computer;

[0031] The decryption module 102 is used to obtain the password generated according to the machine code, and decrypt the password to obtain the start time and the longest available days;

[0032] Timing and counting module 103, used for counting down according to the start time and the longest available days;

[0033] Reminder warning module 104, for when the countdown is less than the time threshold, prompting;

[0034] The screen lock module 105 is configured to lock the screen of the industrial computer when the countdown reaches zero.

[...

Embodiment 2

[0059] figure 2 It is a schematic flowchart of a shield machine authorization management method provided according to an embodiment of the present application, such as figure 2 As shown, the method may include:

[0060] Step 201, generate the machine code corresponding to the shield machine industrial computer according to the CPU hardware serial number of the shield machine industrial computer;

[0061] Step 202, obtain the password generated according to the machine code, and decrypt the password to obtain the start time and the longest available days;

[0062] Step 203, counting down according to the start time and the longest available days;

[0063] Step 204, when the countdown is less than the time threshold, prompting;

[0064] Step 205, when the countdown is zero, lock the screen of the industrial computer.

[0065] Wherein, the method for generating the machine code corresponding to the shield machine industrial computer according to the CPU hardware serial numb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the shield tunneling machine authorization management method and system and the storage medium, the machine code corresponding to the shield tunneling machine industrial personal computer is generated by the machine code generation module according to the CPU hardware serial number of the shield tunneling machine industrial personal computer, then the password generated according to the machine code is obtained through the decryption module, the password is decrypted, and the operation of the shield tunneling machine industrial personal computer is completed. The starting time and the longest available day number are obtained, the timing and counting module counts down according to the starting time and the longest available day number, when the countdown is smaller than a time threshold value, the reminding and warning module gives a prompt, and when the countdown is zero, the screen locking module locks a screen of the industrial personal computer. Therefore, the labor cost and the maintenance cost in shield tunneling machine management are reduced. Meanwhile, the machine codes in one-to-one correspondence with the industrial personal computers are generated, so that the same authorization cannot be used in series, the authorization effect is improved, and the shield tunneling machine property right party can effectively, conveniently and safely manage the authorization of the shield tunneling machine.

Description

technical field [0001] The present application relates to the field of shield machine technology, in particular to a shield machine authorization management method, system and storage medium. Background technique [0002] With the development of infrastructure and the vigorous promotion of underground space development, the demand for shield machines has also increased year by year. Due to the high price of the shield machine and the disparity between the construction period and the life cycle of the shield machine, the business model of shield machine rental has been widely used. However, how to prevent the lessee from continuing to use the shield machine after the lease expires is an urgent problem to be solved. [0003] In related technologies, there are the following two processing methods to solve the above problems: [0004] Method 1. Human intervention to control the core hardware. For example, the core control unit or data storage device of the shield machine equi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/73
CPCG06F21/73G06F2221/2137G06F2221/2141
Inventor 刘绥美杨梦柳陈可吴友兴谭远良黄山乙刘祥韩少锋章龙管李开富
Owner CHINA RAILWEY ENG SERVICE CO LTD