[go: up one dir, main page]

CN119835641A - Data security protection method and device for atomic layer deposition equipment and storage medium - Google Patents

Data security protection method and device for atomic layer deposition equipment and storage medium Download PDF

Info

Publication number
CN119835641A
CN119835641A CN202411912887.1A CN202411912887A CN119835641A CN 119835641 A CN119835641 A CN 119835641A CN 202411912887 A CN202411912887 A CN 202411912887A CN 119835641 A CN119835641 A CN 119835641A
Authority
CN
China
Prior art keywords
login
interface
atomic layer
layer deposition
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411912887.1A
Other languages
Chinese (zh)
Inventor
陆佳伟
明帅强
刘振强
黄亮
康福臣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiaxing Zhongke Microelectronic Instrument And Equipment Engineering Center
Original Assignee
Jiaxing Zhongke Microelectronic Instrument And Equipment Engineering Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiaxing Zhongke Microelectronic Instrument And Equipment Engineering Center filed Critical Jiaxing Zhongke Microelectronic Instrument And Equipment Engineering Center
Priority to CN202411912887.1A priority Critical patent/CN119835641A/en
Publication of CN119835641A publication Critical patent/CN119835641A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The application belongs to the field of atomic layer deposition, and relates to a data security protection method, a device and a storage medium of atomic layer deposition equipment, wherein the method comprises the steps of obtaining a roaming threshold value; acquiring signal intensity of a wireless access point, comparing the signal intensity with the roaming threshold value, and performing roaming switching on the wireless access point according to a comparison result. The data security protection method, the device and the storage medium of the atomic layer deposition equipment can ensure the normal operation of the atomic layer deposition equipment, avoid being interfered by external factors and improve the security coefficient of important data in the equipment.

Description

Data security protection method and device for atomic layer deposition equipment and storage medium
Technical Field
The present invention relates to the field of atomic layer deposition technologies, and in particular, to a method and apparatus for protecting data security of an atomic layer deposition device, and a storage medium.
Background
In recent years, the enhancement of informatization application of industrial equipment provides a lot of support for improving the efficiency and quality of industrial production. The control system of the industrial equipment is often the core of normal operation of an enterprise, if the control system is attacked, the normal operation of production can be directly or indirectly influenced, even other equipment is influenced, and the safety of important data in the equipment cannot be guaranteed.
Meanwhile, the current part of enterprises only pay attention to the improvement of functions and efficiency for own equipment, so that the management of equipment data security is often neglected, and the problems of equipment network mixing, excessive unnecessary interfaces, lagging encryption mode and the like exist, which can influence the data security of enterprise equipment and damage the interests of the enterprises. While atomic layer deposition equipment users are mostly involved in secret data, data security is particularly important in the use process of the equipment.
Disclosure of Invention
In view of the above, the present invention provides a method, apparatus and storage medium for protecting data security of an atomic layer deposition device.
Specifically, the invention is realized by the following technical scheme:
According to a first aspect of the present invention, there is provided a data security protection method for an atomic layer deposition apparatus, the method comprising the steps of:
acquiring login information input by a user;
displaying a corresponding display interface according to the login information;
acquiring the idle time of the display interface;
judging whether the idle time reaches a preset duration or not;
if yes, returning to the login interface from the display interface;
if not, acquiring the operation information of the display interface.
Optionally, the step of obtaining login information input by the user includes the steps of:
Acquiring a login account input by a user;
And acquiring a login password input by a user.
Optionally, the displaying the corresponding display interface according to the login information includes the steps of:
acquiring a login account in the login information;
judging whether the login account is pre-stored in a database;
If yes, displaying a login interface;
If not, displaying a registration interface.
Optionally, the displaying the login interface further includes the steps of:
Acquiring a login password in the login information;
judging whether the login password is prestored in a database;
If yes, displaying an operation interface;
if not, displaying a retrieving password interface.
Optionally, the displaying the registration interface further includes the steps of:
Acquiring a login password in the login information;
And correspondingly storing the login account and the login password into a database.
Optionally, the displaying the operation interface includes the steps of:
Acquiring an operation authority corresponding to the login account;
and displaying interface content corresponding to the operation authority on the operation interface.
Optionally, the method further comprises the steps of:
Periodically storing data of the atomic layer deposition equipment in a preset format;
Encrypting the data.
According to a second aspect of the present invention, there is provided an atomic layer deposition apparatus data security protection apparatus comprising:
the information acquisition module is used for acquiring login information input by a user;
The display module is used for displaying a corresponding display interface according to the login information;
the time acquisition module is used for acquiring the idle time of the display interface;
the judging module is used for judging whether the idle time reaches a preset duration or not;
the execution module is used for executing preset operation according to the result of the judging module;
When the result of the judging module is yes, the executing module returns to the login interface from the display interface; and when the result of the judging module is negative, the executing module acquires the operation information of the display interface.
According to a third aspect of the present invention there is provided an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any of the methods described above when the program is executed.
According to a fourth aspect of the present invention there is provided a storage medium having stored thereon a computer program which when executed by a processor performs the steps of any of the methods described above.
The technical scheme provided by the invention has at least the following beneficial effects:
The data security protection method, the device and the storage medium of the atomic layer deposition equipment can ensure the normal operation of the atomic layer deposition equipment, avoid being interfered by external factors and improve the security coefficient of important data in the equipment.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required to be used in the description of the embodiments or the related art will be briefly described below, and it will be apparent to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
Fig. 1 is a schematic flow chart of a data security protection method for an atomic layer deposition device according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a data security protection device for an ALD apparatus according to an embodiment of the present invention;
Fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a storage medium according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Fig. 1 schematically shows a flow chart of a data security protection method of an atomic layer deposition apparatus, which is suitable for use in an embodiment of the present invention. The data security protection method based on the roaming switching of the signal intensity of the wireless access point is provided in the background of atomic layer deposition (Atomic Layer Deposition, ALD) equipment, and the core of the method is data security and network connection stability of the atomic layer deposition equipment. The following is a detailed analysis and extension of the method:
1. the method realizes data security protection by the following steps:
a roaming threshold is obtained that is used to determine whether the signal strength of the wireless access point is strong enough to maintain a stable network connection. The roaming threshold is typically set according to the network requirements of the device and the stability of the network environment.
And acquiring the signal strength of the wireless access point, namely continuously monitoring the signal strength of the wireless access point which is connected at present by the equipment to evaluate the stability of network connection.
Comparing the signal strength with a roaming threshold, namely comparing the monitored signal strength with a preset roaming threshold to judge whether the wireless access point needs to be switched to another wireless access point.
And (3) roaming switching is carried out according to the comparison result, namely if the signal strength is lower than the roaming threshold value, the equipment is automatically switched to a wireless access point with stronger signal so as to ensure the stability of network connection and continuous transmission of data.
2. Data security protection mechanism
While the core of this approach is roaming handoff of the wireless access point, it indirectly improves the ability of data security protection:
And the network interruption is avoided, namely, through timely roaming switching, the connection interruption caused by weak network signals can be avoided, and thus, the continuous transmission and the integrity of data are ensured.
The stable network connection can reduce data transmission errors or losses caused by network fluctuation or external interference (such as electromagnetic interference, physical barriers and the like).
The stability of the equipment is improved, stable network connection and timely roaming switching are beneficial to maintaining the overall stability of the equipment, and equipment faults or data damage caused by network problems are reduced.
3. Apparatus and storage medium
The device comprises a sensor for monitoring the signal strength, a processor for processing the comparison of the signal strength and the roaming threshold value, a network interface card for executing roaming switching, and the like.
The storage medium is used for storing roaming threshold values, signal strength historical data, equipment configuration information and the like. These storage media may be internal memory (e.g., RAM, ROM), external memory (e.g., SD card, USB storage device), or network storage (e.g., cloud storage).
4. The method is particularly suitable for atomic layer deposition equipment with high stability and data security and other industrial equipment or systems with high requirements on network connection stability.
Although the core of the method is roaming handover of the wireless access point, the method indirectly improves the data security protection capability of the atomic layer deposition equipment by improving the stability of network connection and reducing external interference. The method is not only suitable for atomic layer deposition equipment, but also can be widely applied to other industrial equipment or systems which need high stability and data security.
Referring to fig. 1, an embodiment of the present invention provides a data security protection method for an atomic layer deposition device, where the method may be applied to an electronic device, such as a PC, a server, a terminal, and the like, and the method may include the following steps:
s1, acquiring login information input by a user;
Illustratively, the step of obtaining login information input by a user includes the steps of:
Acquiring a login account input by a user;
And acquiring a login password input by a user.
In the embodiment of the application, when a user needs to log in the atomic layer deposition equipment, a login account number and a login password are input on an operation interface of the atomic layer deposition equipment. The method is a key link in the process of logging in the atomic layer deposition equipment by a user, and particularly relates to the input of a login account number and a login password.
And acquiring a login account number input by a user, namely when the user needs to login the atomic layer deposition equipment, firstly, finding a login inlet on an operation interface of the equipment. The user then enters his own login account within the designated input box. This account number is typically set by the user at the time of registering the device for uniquely identifying the user's identity. The device will receive and temporarily store this entered account information for subsequent verification steps.
After the login password input by the user is obtained and the login account is input, the user needs to input the login password corresponding to the account in another designated input box. The password is set by the user at registration, and is used for further verifying the identity of the user, so that only the user who knows the correct password can log in the device. The device will also receive and temporarily store this entered password information for comparison with passwords stored in the database.
Confidentiality of account number and password-account number and password entered by user should be kept secret and not acquired by unauthorized persons. The device should take appropriate measures to protect such sensitive information, such as storing and transmitting such information using encryption techniques. The device should set reasonable password strategies, such as limiting password attempts, using complex password combinations, etc., to prevent brute force attacks. Account uniqueness-the account number of each user should be unique to avoid account conflicts and potential security risks.
Application scenario these steps are typically applied in industrial equipment or systems requiring user authentication and authorization, such as atomic layer deposition equipment. In these scenarios, only authenticated users can access and operate the device to ensure the security and stability of the device.
S2, displaying a corresponding display interface according to the login information;
illustratively, the displaying the corresponding display interface according to the login information includes the steps of:
acquiring a login account in the login information;
judging whether the login account is pre-stored in a database;
If yes, displaying a login interface;
If not, displaying a registration interface.
In the embodiment of the application, after a user inputs a login account on an operation interface of an atomic layer deposition device, the atomic layer deposition device judges whether the login account is stored in a database, if the login account is stored, the operation interface jumps to the login interface for receiving a login password input by the user, and if the login account is not stored, the operation interface jumps to the login interface. This step is a process in which the atomic layer deposition apparatus decides which interface (login interface or registration interface) to display according to the login account number input by the user.
And acquiring a login account in the login information, namely receiving and processing the account information by the device after the user inputs the login account on the operation interface of the atomic layer deposition device.
And judging whether the login account is pre-stored in a database, wherein a database is maintained in the equipment and is used for storing the login account of the registered user and other related information. The device will query this database to determine if the user entered login account already exists.
And displaying a corresponding display interface according to the judgment result:
If the login account is pre-stored in the database, which means that the user is a registered user, the device will jump to the login interface. On the login interface, the user needs to input a login password corresponding to the account number to complete the login process.
If the login account is not pre-stored in the database, this means that the user may be a new user or a wrong account is entered. The device may jump to a registration interface allowing the user to register a new account or reenter the correct account.
User experience by distinguishing whether the login account exists or not, the device can provide a more visual and friendly operation interface for the user. The registered user can directly enter the login flow, and the new user can finish account registration through the registration interface.
Security this step also ensures that only registered users can access the login interface of the device, thereby improving the security of the device to a certain extent.
Application scenario these steps are typically applied in industrial equipment or systems requiring user authentication and authorization, such as atomic layer deposition equipment. In these scenarios, the device needs to ensure that only authenticated users can access and operate the device to protect the security and stability of the device.
Illustratively, the displaying the login interface further comprises the steps of:
Acquiring a login password in the login information;
judging whether the login password is prestored in a database;
If yes, displaying an operation interface;
if not, displaying a retrieving password interface.
In the embodiment of the application, after a user inputs a login password on an operation interface of an atomic layer deposition device, the atomic layer deposition device judges whether the login password is stored in a database, if the login password is stored, the user can operate the atomic layer deposition device, the operation interface is displayed, various indexes are arranged on the operation interface for operating the atomic layer deposition device, if the account number is not stored, the user jumps to a password retrieving interface, and the user can retrieve the login password corresponding to the login account number. This step further refines the process of the user completing login authentication on the atomic layer deposition device, in particular the processing logic after the user enters the login password.
Displaying a login interface, namely, the user inputs a login account on the operation interface and successfully jumps to the login interface. The login interface prompts the user to input a login password corresponding to the account.
And acquiring the login password in the login information, namely receiving and processing the password information by the equipment after the user inputs the login password on the login interface.
Judging whether the login password is pre-stored in the database, wherein the device can inquire the database to judge whether the login password input by the user is matched with the stored password. It should be noted here that the plaintext of the password is typically not stored directly, but rather a hash value or other encrypted form of the password is stored to ensure the security of the password.
And displaying a corresponding interface according to the judgment result:
If the login password is pre-stored in the database (i.e. matches the stored password hash value), this means that the user has successfully passed the login authentication, and the device will jump to the operation interface. Various indexes and controls are displayed on the operation interface, so that a user is allowed to operate and control the atomic layer deposition equipment.
If the login password is not pre-stored in the database (i.e., does not match the stored password hash value), this means that the user may have entered the wrong password or the account number is stolen. The device jumps to the retrieving password interface to prompt the user to reset or retrieve the login password through the password retrieving process.
The security is that by storing the hash value or other encrypted form of the password and performing matching verification when the user logs in, the device can ensure that only the user who knows the correct password can access the operation interface. This improves the safety of the device to some extent. The user experience is that the device provides an interface and a process for retrieving the password, so that the user is allowed to reset or retrieve the password through a certain verification means when forgetting the password. This improves the user experience and avoids the situation that the device cannot be logged in due to forgetting the password.
Application scenario these steps are typically applied in industrial equipment or systems requiring high security user authentication, such as atomic layer deposition equipment. In these scenarios, the device needs to ensure that only authenticated users can access and operate the device to protect the security and stability of the device.
Illustratively, the displaying the registration interface further comprises the step of:
Acquiring a login password in the login information;
And correspondingly storing the login account and the login password into a database.
In the embodiment of the application, after the registration interface is displayed, the operation interface of the atomic layer deposition device acquires the login account number and the login password input by the user and stores the login account number and the login password in the database for subsequent login of the user. This step involves the user completing the process of registering a new account on the atomic layer deposition device, particularly the storage logic after the user enters the login account and password.
The registration interface is displayed in such a way that the user has attempted to login but the account does not exist on the operation interface, or the user has actively selected the option of registering a new account, so that the device jumps to the registration interface. The registration interface prompts the user to enter a new login account and a corresponding login password.
And acquiring a login account number and a login password in the login information, wherein after a user inputs a new login account number and a new login password on a login interface, the equipment receives and processes the information.
The login account number and the login password are correspondingly stored in a database, and the device stores the information in the internal database so as to be used in the subsequent user login authentication process. It should be noted that for security reasons, the password is not typically stored directly in plaintext. Instead, the device will store a hash value or other encrypted form of the password. Thus, even if the database is compromised, an attacker cannot directly obtain the user's original password. At the same time, the device may also record some additional information, such as registration time, user role, etc., to support more complex user management and rights control.
Security-by storing the encrypted form of the password, the device can ensure that the original password of the user is not compromised even if the database is compromised. In addition, the device may take other security measures, such as limiting the number of password attempts, using complex password policies, etc., to further increase security. The user experience is that the device provides a concise and clear registration interface and flow, so that the user can easily input a new login account and password and complete registration. This improves the user experience, enabling new users to quickly start using the atomic layer deposition apparatus.
Application scenario these steps are typically applied in industrial equipment or systems requiring new user registration, such as atomic layer deposition equipment. In these scenarios, the device needs to allow new users to register new account numbers so that they can access and operate the device. By storing the user's login account and password, the device can ensure that only authenticated users can access the device's operating interface and sensitive functions.
Illustratively, the displaying the operation interface includes the steps of:
Acquiring an operation authority corresponding to the login account;
and displaying interface content corresponding to the operation authority on the operation interface.
In the embodiment of the application, after a user enters the operation interface, the permission corresponding to the login account is obtained, and the corresponding display interface is displayed according to different permissions. In the use process of the atomic layer deposition equipment, the low-authority user and the high-authority user can see different contents and operation functions in a visual interface, and the highest authority has the functions of deleting the user, changing the passwords of other users, changing the operation authorities of other users and the like, so that the equipment realizes account independence according to the user when in use, is convenient for the management of the equipment, and can primarily ensure the use safety and the data safety of the equipment. The method comprises the step of customizing interface content according to operation authority of a user login account number, wherein the display logic of an atomic layer deposition equipment operation interface is involved.
Displaying an operation interface, namely, the user successfully passes login authentication, and the equipment jumps to the operation interface.
And acquiring the operation authority corresponding to the login account, wherein the equipment can query a database or an authority management system to acquire the operation authority corresponding to the current login account. These rights may include rights to access specific functions, rights to modify device settings, rights to view sensitive data, and the like.
And displaying interface content corresponding to the operation authority on the operation interface, wherein the equipment dynamically generates and displays the content of the operation interface according to the acquired operation authority. For low-rights users, the interface may only display basic operational functions and limited views of the data. For high-rights users, the interface may contain more operational functions, detailed views of the data, and manage the rights of other users.
User rights management:
Rights classification-it is necessary to classify rights of users of different levels on user management of an atomic layer deposition apparatus. This ensures that only users with corresponding rights can access and operate specific device functions. Rights level-user rights should be divided into at least two categories (low rights and high rights), but depending on the actual situation, more rights levels may be required to more finely control the rights of the user to access and operate the device. And a user with low authority can only see and operate basic equipment functions in the visual interface, and cannot access sensitive data or modify key settings. A high-authority user can see more device functions, data views and management options in the visual interface. The highest authority user may even have advanced functions such as deleting users, changing other user passwords, changing other user operating rights, etc.
Device management and security:
The account number is independent, namely, by distributing independent account numbers and authorities for different users, the equipment can realize the account number independence, namely, each user can only access and operate the equipment function matched with the authority. Device management, wherein a device manager can manage all user accounts and rights on the device through the high-rights account, so that the safety and stability of the device are ensured. And the data security is that the equipment can preliminarily ensure the data security by limiting the access of the low-authority user to the sensitive data. Meanwhile, by periodically auditing and monitoring user activities, a device administrator can timely discover and handle potential security risks.
S3, acquiring the idle time of the display interface;
When the user enters the main interface (i.e. the operation interface), the device starts timing, and the idle time from the last operation to the current time of the user is recorded. The idle time refers to the duration of time that the user has not performed any operation (e.g., clicking, entering, etc.) on the device.
S4, judging whether the idle time reaches a preset duration or not;
the device will check if the idle time has reached a preset duration threshold. In this example, the preset time period is set to 15 minutes. However, according to practical situations, the duration can be configurable to adapt to different usage scenarios and security requirements.
S5, if yes, returning to the login interface from the display interface;
If the idle time reaches or exceeds the preset duration, the equipment automatically returns to the login interface from the current operation interface. This means that the user needs to re-enter the login password to re-enter the main operation interface. In returning to the login interface, the device should ensure that the current working state is not affected, e.g. that the ongoing experiment or data processing should be properly saved or paused.
And S6, if not, acquiring the operation information of the display interface.
If the idle time does not reach the preset duration, the device continues to monitor the operation of the user. The device acquires and processes any operation information whenever the user performs any operation, in response to the user's instruction.
In the embodiment of the application, the atomic layer deposition equipment starts protection delay after entering the main interface, if the atomic layer deposition equipment is not operated by a user for 15 minutes, the atomic layer deposition equipment is switched to the login interface on the premise of not influencing the existing working state of the equipment, and the password is required to be input again to reenter the main operation interface, so that the operation of the equipment or the data security is influenced due to the fact that the high-authority user does not log out after using the equipment can be effectively prevented. The security is that through an automatic log-out mechanism, the device can effectively prevent a high-authority user from forgetting to log out after using the device, thereby avoiding potential influence on the operation of the device or the data security. User experience although an automatic log-out mechanism may affect the user experience to some extent (e.g., the user may need to frequently re-log in), this is necessary for security reasons. Meanwhile, the influence on the operation of the user can be reduced to the greatest extent by reasonably setting the preset duration and providing clear prompt information. Application scenario these steps are typically applied in industrial equipment or systems requiring high security user authentication, such as atomic layer deposition equipment. In these scenarios, the device needs to ensure that only authenticated users can access and operate the device, and additional security measures need to be taken to secure the operation and data of the device.
Illustratively, the method further comprises the steps of:
Periodically storing data of the atomic layer deposition equipment in a preset format;
Encrypting the data.
In the embodiment of the application, the data of the atomic layer deposition equipment such as the equipment operation data, the operation log, the operation record, the important parameters in experimental operation and the like are periodically stored in a text form, and are regularly and automatically backed up and recorded in an encrypted hard disk by the atomic layer deposition equipment through the customized encryption, so that the possibility of data loss and leakage can be reduced. The steps involve data preservation and encryption mechanisms of the atomic layer deposition apparatus, which are critical to ensure the integrity and security of the data.
And periodically storing data of the atomic layer deposition equipment in a preset format, wherein the atomic layer deposition equipment can generate a large amount of data in the operation process, including equipment operation data, operation logs, operation records, important parameters in experimental operation and the like. The data may be stored in a predetermined format (e.g., text file, database record, etc.) to ensure the readability and resolvability of the data. The save is periodic, meaning that the device will automatically save the data at certain intervals (e.g., hourly, daily, etc.) to ensure the integrity and continuity of the data.
The data is encrypted and the device encrypts the data before or after storing the data. Encryption may use custom passwords or keys, meaning that only people who know the passwords or keys can decrypt and access the data. The purpose of encryption is to protect the confidentiality of data, preventing unauthorized persons from obtaining or tampering with the data.
The data is automatically backed up periodically and recorded in the encrypted hard disk, and the device automatically backs up the stored data periodically (e.g. daily, weekly, etc.). Backup data may be recorded to an encrypted hard disk, which means that the backup data may be protected even if the local storage of the device fails or the data is lost. The use of an encrypted hard disk further enhances the security of the data because even if the hard disk is stolen or lost, unauthorized persons cannot decrypt and access the data therein.
Data security-through encryption and periodic backup mechanism, the device can ensure the security of data in the process of storage and transmission. Even if data is stolen or compromised, unauthorized persons cannot decrypt and access the data. Data integrity-periodic save and automatic backup mechanisms can ensure the integrity and continuity of data. Even if the device fails or data is lost, it can be restored by backing up the data.
Application scenario these steps are typically applied in industrial equipment or systems requiring high data security and integrity, such as atomic layer deposition equipment. In these scenarios, the data generated by the device may contain sensitive information or experimental results, which need to be strictly protected.
As shown in fig. 2, the present application provides a data security protection device for an atomic layer deposition apparatus, including:
an information acquisition module 10, configured to acquire login information input by a user;
the display module 20 is configured to display a corresponding display interface according to the login information;
a time acquisition module 30, configured to acquire a blank time of the display interface;
A judging module 40, configured to judge whether the idle time reaches a preset duration;
an execution module 50, configured to execute a preset operation according to a result of the determination module;
when the result of the judging module 40 is yes, the executing module 50 returns to the login interface from the display interface; when the result of the judging module 40 is no, the executing module 50 obtains the operation information of the display interface.
The specific structure and the working principle of each module in the data safety protection device of the atomic layer deposition equipment are as follows:
1. information acquisition module 10
In particular, the information acquisition module 10 is generally composed of one or more input interfaces, which may be a physical keyboard, a virtual keyboard on a touch screen, a fingerprint identifier, a dynamic verification code receiver, etc. In addition, the module also comprises a signal processing circuit and a storage unit, and is used for receiving, processing and storing login information input by a user.
The working principle is that a user inputs login information such as a user name and a password through an input interface (such as a keyboard or a touch screen).
The signal processing circuit decodes and verifies the information input by the user, and ensures the accuracy and the integrity of the information. The storage unit compares the decoded login information with preset legal user information to verify the identity of the user. If the verification is passed, the information acquisition module will send a signal to the display module 20 indicating that it displays the corresponding operation interface, and if the verification is failed, an error prompt message is displayed.
2. Display module 20
The display module 20 mainly comprises a display screen and a control circuit. The display screen may be of the LCD, LED or OLED type for displaying various information. The control circuit is responsible for receiving the instructions from the information acquisition module and the judgment module and controlling the display content of the display screen.
The working principle is that after the information acquisition module 10 verifies the identity of the user, a display instruction is sent to the display module 20. After receiving the instruction, the control circuit retrieves an operation interface corresponding to the login information from a preset display content library. The display screen displays a corresponding operation interface according to the output signal of the control circuit so as to enable a user to perform subsequent operation.
3. Time acquisition module 30
In particular, the time acquisition module 30 is typically comprised of a high precision clock and a timer. The clock provides an accurate time reference and the timer is used to record the interaction between the user and the display interface.
Working principle when the user starts to interact with the display interface (e.g. clicks on a button, inputs information etc.), the time acquisition module 30 starts to count time. If the user does not have any interaction with the display interface for a period of time (i.e., is in a free state), the timer will continue to run and record the free time. When the idle time reaches a preset threshold, the time acquisition module 30 sends a signal to the judgment module 40, instructing it to make a subsequent judgment.
4. Judgment module 40
The judging module 40 mainly comprises a comparator and a logic circuit. The comparator is used for comparing the idle time provided by the time acquisition module 30 with a preset duration threshold. The logic circuit judges whether the preset operation is required to be executed according to the output signal of the comparator.
Principle of operation the idle time signal provided by the time acquisition module 30 is received. And comparing the idle time with a preset duration threshold. If the idle time is greater than or equal to the duration threshold, the logic circuit outputs a "yes" signal, and if the idle time is less than the duration threshold, a "no" signal is output. Based on the result of the output signal, a corresponding instruction is sent to the execution module 50.
5. Execution module 50
The execution module 50 mainly comprises a control unit and an actuator. The control unit is responsible for receiving the instruction of the judging module and controlling the action of the executor according to the instruction. The actuator can be a display screen controller, an audible and visual alarm, a log recorder and other devices.
The working principle is that the instruction signal of the judging module 40 is received. The control unit decides which operation to perform according to the content of the command signal. If the instruction signal is yes (i.e. the idle time reaches the preset duration), the control unit controls the display screen controller to switch the display interface back to the login interface, and possibly triggers the audible and visual alarm to remind the user. If the instruction signal is 'no' (i.e. the idle time does not reach the preset duration), the control unit continues to monitor the operation information of the display interface and prepares to perform corresponding operation according to the subsequent instruction. The executor executes corresponding actions, such as switching display interfaces, recording logs and the like, according to the output signals of the control unit.
In summary, the data security protection device of the atomic layer deposition equipment realizes the functions of verification of user login information, dynamic switching of a display interface, monitoring of idle time, execution of preset operation and the like through the cooperative work of all modules, thereby effectively guaranteeing the data security of the equipment.
The data security protection device of the atomic layer deposition equipment provided by the application can execute the data security protection method of the atomic layer deposition equipment provided by the steps.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explanation of the principles of the present invention and are in no way limiting of the invention. Accordingly, any modification, equivalent replacement, improvement, etc. made without departing from the spirit and scope of the present invention should be included in the scope of the present invention. Furthermore, the appended claims are intended to cover all such changes and modifications that fall within the scope and boundary of the appended claims, or equivalents of such scope and boundary.
Referring now to fig. 3, a schematic diagram of an electronic device 100 suitable for use in implementing embodiments of the present disclosure is shown. The electronic devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 3 is merely an example and should not be construed to limit the functionality and scope of use of the disclosed embodiments.
As shown in fig. 3, the electronic device 100 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 101 that may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 102 or a program loaded from a storage means 108 into a Random Access Memory (RAM) 103. In the RAM 103, various programs and data necessary for the operation of the electronic apparatus 100 are also stored. The processing device 101, ROM 102, and RAM 103 are connected to each other by a bus 104. An input/output (I/O) interface 105 is also connected to bus 104.
In general, devices may be connected to I/O interface 105 including input devices 106 such as a touch screen, touch pad, keyboard, mouse, image sensor, microphone, accelerometer, gyroscope, etc., output devices 107 including a Liquid Crystal Display (LCD), speaker, vibrator, etc., storage devices 108 including magnetic tape, hard disk, etc., and communication devices 109. The communication means 109 may allow the electronic device 100 to communicate wirelessly or by wire with other devices to exchange data. While an electronic device 100 having various means is shown in the figures, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 109, or from the storage means 108, or from the ROM 102. The above-described functions defined in the methods of the embodiments of the present disclosure are performed when the computer program is executed by the processing device 101.
Referring now to fig. 4, there is illustrated a schematic diagram of a computer readable storage medium suitable for use in implementing embodiments of the present disclosure, the computer readable storage medium storing a computer program that, when executed by a processor, is capable of implementing an atomic layer deposition apparatus data security protection method as described in any one of the above.
The application also provides a computer program product. Comprising computer program/computer executable instructions which, when executed by a processor of an electronic device, implement the steps of the atomic layer deposition apparatus data security protection method of any of the preceding claims.
The data security protection method, the device and the storage medium of the atomic layer deposition equipment can ensure the normal operation of the atomic layer deposition equipment, avoid being interfered by external factors and improve the security coefficient of important data in the equipment.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
The foregoing is only a specific embodiment of the invention to enable those skilled in the art to understand or practice the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1.一种原子层沉积设备数据安全保护方法,其特征在于,所述方法包括步骤:1. A method for protecting data security of an atomic layer deposition device, characterized in that the method comprises the steps of: 获取用户输入的登录信息;Get the login information entered by the user; 根据所述登录信息显示对应的显示界面;Displaying a corresponding display interface according to the login information; 获取所述显示界面的空置时间;Obtaining the idle time of the display interface; 判断所述空置时间是否达到预设时长;Determine whether the idle time reaches a preset time length; 若是,从所述显示界面返回登录界面;If yes, return to the login interface from the display interface; 若否,获取所述显示界面的操作信息。If not, obtain operation information of the display interface. 2.根据权利要求1所述的原子层沉积设备数据安全保护方法,其特征在于,所述获取用户输入的登录信息包括步骤:2. The method for protecting data security of an atomic layer deposition device according to claim 1, wherein the step of obtaining login information input by a user comprises the following steps: 获取用户输入的登录账号;Get the login account entered by the user; 获取用户输入的登录密码。Get the login password entered by the user. 3.根据权利要求1所述的原子层沉积设备数据安全保护方法,其特征在于,所述根据所述登录信息显示对应的显示界面包括步骤:3. The method for protecting data security of an atomic layer deposition device according to claim 1, wherein displaying a corresponding display interface according to the login information comprises the steps of: 获取所述登录信息中的登录账号;Obtaining the login account in the login information; 判断所述登录账号是否预存在数据库中;Determine whether the login account is pre-existing in the database; 若是,显示登录界面;If yes, display the login interface; 若否,显示注册界面。If not, the registration interface is displayed. 4.根据权利要求3所述的原子层沉积设备数据安全保护方法,其特征在于,所述显示登录界面之后还包括步骤:4. The method for protecting data security of atomic layer deposition equipment according to claim 3, characterized in that after displaying the login interface, the method further comprises the following steps: 获取所述登录信息中的登录密码;Obtaining the login password in the login information; 判断所述登录密码是否预存在数据库中;Determine whether the login password is pre-stored in the database; 若是,显示操作界面;If yes, display the operation interface; 若否,显示找回密码界面。If not, the password retrieval interface is displayed. 5.根据权利要求3所述的原子层沉积设备数据安全保护方法,其特征在于,所述显示注册界面之后还包括步骤:5. The method for protecting data security of atomic layer deposition equipment according to claim 3, characterized in that after displaying the registration interface, the method further comprises the following steps: 获取所述登录信息中的登录密码;Obtaining the login password in the login information; 将所述登录账号和所述登录密码对应存储至数据库中。The login account and the login password are stored in a database accordingly. 6.根据权利要求4所述的原子层沉积设备数据安全保护方法,其特征在于,所述显示操作界面包括步骤:6. The data security protection method for atomic layer deposition equipment according to claim 4, characterized in that the display operation interface comprises the steps of: 获取所述登录账号对应的操作权限;Obtaining the operation authority corresponding to the login account; 在所述操作界面上显示与所述操作权限对应的界面内容。The interface content corresponding to the operation authority is displayed on the operation interface. 7.根据权利要求1所述的原子层沉积设备数据安全保护方法,其特征在于,还包括步骤:7. The method for protecting data security of atomic layer deposition equipment according to claim 1, further comprising the steps of: 以预设格式周期性保存原子层沉积设备的数据;Periodically save the data of the atomic layer deposition equipment in a preset format; 对所述数据进行加密。The data is encrypted. 8.一种原子层沉积设备数据安全保护装置,其特征在于,包括:8. A data security protection device for atomic layer deposition equipment, comprising: 信息获取模块,用于获取用户输入的登录信息;An information acquisition module is used to obtain login information input by the user; 显示模块,用于根据所述登录信息显示对应的显示界面;A display module, used to display a corresponding display interface according to the login information; 时间获取模块,用于获取所述显示界面的空置时间;A time acquisition module, used to acquire the idle time of the display interface; 判断模块,用于判断所述空置时间是否达到预设时长;A determination module, used to determine whether the idle time reaches a preset time length; 执行模块,用于根据所述判断模块的结果执行预设操作;An execution module, used to execute a preset operation according to the result of the judgment module; 其中,当所述判断模块的结果为是时,所述执行模块从所述显示界面返回登录界面;当所述判断模块的结果为否时,所述执行模块获取所述显示界面的操作信息。When the result of the judgment module is yes, the execution module returns to the login interface from the display interface; when the result of the judgment module is no, the execution module obtains the operation information of the display interface. 9.一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述程序时实现权利要求1-7任一项所述方法的步骤。9. An electronic device comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the method according to any one of claims 1 to 7 when executing the program. 10.一种存储介质,其上存储有计算机程序,其特征在于,所述程序被处理器执行时实现权利要求1-7中任一项所述方法的步骤。10. A storage medium having a computer program stored thereon, characterized in that when the program is executed by a processor, the steps of the method according to any one of claims 1 to 7 are implemented.
CN202411912887.1A 2024-12-24 2024-12-24 Data security protection method and device for atomic layer deposition equipment and storage medium Pending CN119835641A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411912887.1A CN119835641A (en) 2024-12-24 2024-12-24 Data security protection method and device for atomic layer deposition equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411912887.1A CN119835641A (en) 2024-12-24 2024-12-24 Data security protection method and device for atomic layer deposition equipment and storage medium

Publications (1)

Publication Number Publication Date
CN119835641A true CN119835641A (en) 2025-04-15

Family

ID=95308579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411912887.1A Pending CN119835641A (en) 2024-12-24 2024-12-24 Data security protection method and device for atomic layer deposition equipment and storage medium

Country Status (1)

Country Link
CN (1) CN119835641A (en)

Similar Documents

Publication Publication Date Title
US10375116B2 (en) System and method to provide server control for access to mobile client data
US11704134B2 (en) Device locator disable authentication
RU2620998C2 (en) Method and authentication device for unlocking administrative rights
CN104094275B (en) For the security strategy of device data
CN102597960B (en) data protection device
US9544306B2 (en) Attempted security breach remediation
US7421589B2 (en) System and method for lost data destruction of electronic data stored on a portable electronic device using a security interval
CN106534148B (en) Access control method and device for application
US8296841B2 (en) Trusted platform module supported one time passwords
US20220179927A1 (en) Verifying method for software authorization under offline environment
US20150047019A1 (en) Information processing method and electronic device
JP4599882B2 (en) Unauthorized browsing monitoring system
WO2016179590A1 (en) Method for delegated authentication, access control and confirmation of irreversible commands in a storage device
US20240265135A1 (en) Controlling a screenshot function to obfuscate sensitive information in a screenshot
CN118606966A (en) IDENTITY AUTHENTICATION METHOD, DEVICE, EQUIPMENT AND STORAGE MEDIUM
JP5730735B2 (en) Security management system, method and program
CN119835641A (en) Data security protection method and device for atomic layer deposition equipment and storage medium
JP2006146744A (en) Removable media information management method and system
JP2020507170A (en) Methods for restricting access to data connections by electronic devices
KR20010087034A (en) Security Keyboard and Network Security Method by Using the Security Keyboard
KR20080030457A (en) Information leakage suppression system, information leakage suppression program, information leakage suppression recording media and information leakage suppression system
JP2010092288A (en) File management method, management terminal, information processing terminal, file management system, and file management program
KR20080030458A (en) Information leakage suppression system, information leakage suppression program, information leakage suppression recording media and information leakage suppression system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination