Font Size: a A A

Design And Implementation Of Authentication And Permission Management In Manufacture Information System

Posted on:2015-04-20Degree:MasterType:Thesis
Country:ChinaCandidate:S C LeiFull Text:PDF
GTID:2308330452952831Subject:Computer technology
Abstract/Summary:PDF Full Text Request
It has become a trend at present that manufacture management informationsystem is introduced in the field of manufacture to improve the level of managementof the enterprise and enhance production efficiency. Developing advancedmanufacture management information system for manufacturing enterprises has verybroad market prospects. It is on such application background that the project ofFactory Intelligent Management System (FIMS) has been proposed. In order todevelop Factory Intelligent Management System, identity authentication andpermission managementis an essential part of that. Therefore, itis necessary todevelop identity authentication and permission management system for FactoryIntelligent Management System.Aiming at the problem of permission management, this paper makes a deeplystudy on the role-based access control model which is widely used on the current,analyzes several typical role-based access control model, and then design andimplementpermission management system based on role.Aiming at the problem ofidentity authentication,authenticationtheory, encryption algorithm and authorizationmethod are studied and analyzed in details, then anidentity authenticationsystembased on multiple authentication of username/password and client device andserver is designed and implemented.Permission management based on role makes the management ofuser’spermissions more flexible, convenient and efficient. System administratorcanchange user’s permissions only by adjust one’s roles. If user wants to access thesystem, not only does the system verifyusername and password, but alsoauthenticateuser’s equipment. The equipment which has not been authorized cannotbe allowed to access the system, which enhance the security of the system.The centralserver can perform remote authentication and authorization on user’s equipment andthe server, which makesthat becomes more convenient, at the same time also providemore beneficial guarantee for system safety.
Keywords/Search Tags:Permissions, Authentication, Authorization, Manufacture
PDF Full Text Request
Related items