Font Size: a A A

The Research On Security Technique For The Product Life Cycle Management

Posted on:2006-08-04Degree:MasterType:Thesis
Country:ChinaCandidate:J Y MaFull Text:PDF
GTID:2168360152994577Subject:Mechanical and electrical engineering
Abstract/Summary:PDF Full Text Request
The PLM (Product Life Cycle Management) integrates advanced management principle and the top-grade information technique to modern enterprise producing and commercial operating, and realizes cooperative work in multi-departments by sharing the long-range data in Intranet. So the enterprise can efficiently adjust the operation means and the management mode, then develop the competitive advantage of the business enterprise.This paper studies one of the important functions in PLM—management of security technique. This technique makes the important information such as design manual, engineering documents, craft documents, the order of product form and various of medium information that generated in the PLM process can be input, store and transmit securely. It can also avoid the missing, divulging and illegally distorting of the data information. In this way, it assures the secure running of other function modes, and guarantees the fluent flow of the enterprise operation.This paper divides the management of security technique into three layers. The foundation facilities layer adopts fire-wall and the VPN (Virtual Private NetWork) technique to construct the secure environment in network. Supporting service layer adopts the encryption and decryption techniques to assure secure delivery of information, and puts forward a XML-based secure delivery model of information on web, which realizes partly encryption and decryption of important information. It not only ensures the data security, but also increases the delivery speed of information among alliance enterprises. In design platform layer, this paper researches users management and right management. The module of users management expands the the range of users -to the alliance enterprise,which makes the alliance enterprise paticipate in the cooperative design by PLM. The module of right management researches the control method of functional right and the entity data right, and brings forward the functional right and the entity data right based on projection role and identity role, which realizes the right management about dynamic data and static data. It effectively ensures the secure use of the business enterprise product information.
Keywords/Search Tags:PLM, secure, encryption and decryption techniques, users management, functional right, entity data right, Role
PDF Full Text Request
Related items