Industrial internet system password application management system

An industrial Internet and system password technology, applied in the field of industrial Internet data encryption, can solve problems such as abnormal equipment, inability to use secure face fingerprints, and forgetting, and achieve the effect of preventing theft from prying eyes

Pending Publication Date: 2022-04-29
汤洁
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although there are encryption steps in the operation process of the existing industrial Internet system, so that unauthorized operators cannot perform corresponding operations on the industrial Internet system, due to the manufacturing and processing of electronic components, in order to ensure that the quality of the processed electronic products is not affected, usually It is carried out in a dust-free workshop, and the operators are all wearing dust-free clothes, dust-free hats, dust-free glasses, and dust-free gloves, etc., and cannot use unlocking methods such as face fingerprints with higher security, making the decryption operation a traditional input Cipher
Similarly, operators with a higher level of authorization are faced with many intelligent devices in the workshop. Because different devices correspond to different industrial Internet system passwords, and the passwords are often changed, authorized operators often forget numerous passwords and delay operation progress. ; and because some passwords are relatively simple, when the operator enters the password to enter the industrial Internet system, it is easy to be peeped by irrelevant personnel, resulting in the possibility of equipment abnormality due to misoperation by unauthorized personnel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial internet system password application management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] see figure 1, the present invention provides a technical solution: an industrial Internet system password application management system, including a login security monitoring module, a password input control module, and a technical verification and decryption module. The environment is monitored and analyzed, the password input control module is electrically connected to the login security monitoring module, the password input control module is used to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an industrial internet system password application management system, which comprises a login safety monitoring module, a password input regulation and control module and a technical verification decryption module, and is characterized in that the login safety monitoring module is used for monitoring and analyzing a surrounding environment when an operator logs in an industrial internet system; the password input regulation and control module is electrically connected with the login safety monitoring module, and is used for intelligently regulating and controlling the display and operation of a login password according to the environment condition when the login password is input; the technical verification decryption module is used for verifying the technical level of operating an equipment system by an operator to carry out decryption operation on an industrial internet system, the login security monitoring module comprises a system password management module, an encryption level acquisition module and an operation environment analysis module, and the system has the characteristics of high security and strong practicability.

Description

technical field [0001] The invention relates to the technical field of industrial Internet data encryption, in particular to an industrial Internet system password application management system. Background technique [0002] The essence of the Industrial Internet is to closely connect and integrate equipment, production lines, factories, suppliers, products, and customers through an open and global industrial-grade network platform, and efficiently share various element resources in the industrial economy. , Intelligent production methods reduce costs, increase efficiency, help the manufacturing industry to extend the industrial chain, and promote the transformation and development of the manufacturing industry. [0003] In recent years, the domestic digital workshop construction has developed rapidly, especially the digital workshop platform represented by the manufacturing and processing of electronic components. The use of industrial Internet systems can manage equipment,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/64
CPCG06F21/602G06F21/64
Inventor 汤洁
Owner 汤洁
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products