[go: up one dir, main page]

WO2017033515A1 - Procédé permettant de gérer un système d'analyse et système d'analyse - Google Patents

Procédé permettant de gérer un système d'analyse et système d'analyse Download PDF

Info

Publication number
WO2017033515A1
WO2017033515A1 PCT/JP2016/065217 JP2016065217W WO2017033515A1 WO 2017033515 A1 WO2017033515 A1 WO 2017033515A1 JP 2016065217 W JP2016065217 W JP 2016065217W WO 2017033515 A1 WO2017033515 A1 WO 2017033515A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
worker
management
management device
information terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2016/065217
Other languages
English (en)
Japanese (ja)
Inventor
祐介 横井
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shimadzu Corp
Original Assignee
Shimadzu Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shimadzu Corp filed Critical Shimadzu Corp
Publication of WO2017033515A1 publication Critical patent/WO2017033515A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N35/00Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Definitions

  • the present invention provides various devices for analyzing the composition, properties, structure, etc. of a target substance, and various devices for qualitatively and quantitatively measuring the composition, properties, structure, state, etc. of a target substance (hereinafter referred to as , And these are simply referred to as analysis devices.), And a system including a computer (workstation) connected to them and controlling data obtained by analyzing them and performing analysis and measurement with them. (Hereinafter, these are also simply referred to as analysis systems).
  • portable information terminals such as smartphones, tablets, and wristwatch-type terminals that can be carried by workers are connected to a workstation via a wireless LAN or the Internet.
  • analyzers via the Internet.
  • the work on the workstation often overlaps, but multiple workers are responsible for each of the personal digital assistants that they own. If the management work related to the analyzer is performed, duplication of work at the workstation can be avoided, and there is an advantage that the utilization efficiency of the analyzer and the work efficiency of the worker are improved.
  • the problem to be solved by the present invention is to perform reliable authentication by a simpler method when performing management work using a portable information terminal separately from management work using a management apparatus that manages an analysis device, It is to provide a technique for facilitating management work using a portable information terminal.
  • the management method of the analysis system according to the present invention made to solve the above problems is as follows: A first authentication step in which a worker who uses a management device that manages the analysis device authenticates the worker when the management device starts management work and permits the authenticated worker to use the management device. When, An output step of outputting an image including information relating to the authentication of the worker after the authentication of the worker is completed; A reading step of reading the image with a portable information terminal; A second authentication step of authenticating a worker based on the read image and permitting the authenticated worker to use the management device via the portable information terminal.
  • the management method After authentication of the worker (authentication related to permission for use of the management device, hereinafter also referred to as “first authentication”) is performed in the management device, information regarding the authentication of the worker is obtained.
  • the image output here can be, for example, a barcode (one-dimensional barcode or two-dimensional barcode), a graphic, or a combination thereof.
  • the management apparatus requests authentication of the person who operates the portable information terminal through the portable information terminal. To do. At this time, the worker causes the portable information terminal to read the image output from the management device.
  • the authenticated worker can perform management work using the management device via the portable information terminal.
  • the analysis system targeted by the management method according to the present invention may be such that one management device manages only one analysis device, or one management device includes a plurality of analysis devices. It may be one that manages.
  • the “management work” referred to here includes various work related to creation of analysis conditions, control of the analysis apparatus, analysis of analysis data, and the like.
  • the management method is preferably:
  • the first authentication step comprises: An input receiving step for receiving an input of an enumeration of multi-digit symbols including information related to the authentication of the worker; An authentication step of authenticating the worker based on the input sequence of the multi-digit symbols;
  • the output step comprises: A conversion step of converting the sequence of the multi-digit symbols into the image;
  • Including The second authentication step comprises: A specifying step of specifying a sequence of the multi-digit symbols from the image; An authentication step of authenticating the worker based on the specified sequence of the multi-digit symbols; It is characterized by including.
  • the authentication information used for the first authentication is an enumeration of multi-digit symbols, which are converted into an image and output, and the image is used for the second authentication.
  • the authentication information since it is not necessary to issue two pieces of authentication information for one worker, management of the authentication information is facilitated and safety is enhanced.
  • a single worker associates a log of management work performed from the management device and a log of management work performed via the portable information terminal with a single piece of authentication information and leaves it as a series of operation logs. Log information can be managed easily.
  • the management method is preferably:
  • the output step comprises: Printing the image on a medium; It is characterized by including.
  • the worker when the operator has a printed medium and wants to perform management work from the portable information terminal, the worker reads the image printed on the medium with the portable information terminal and receives the second authentication. Can do. According to this configuration, the worker can receive the authentication at an arbitrary timing.
  • the management method is preferably:
  • the output step comprises: Displaying the image on a display device included in the management device; It is characterized by including.
  • the worker can receive the second authentication by reading the image displayed on the display device included in the management device with the portable information terminal. According to this configuration, for example, by erasing the image from the display device before the worker leaves the management device, the risk of leaking an image including information related to worker authentication to another person is reduced.
  • the present invention is also directed to an analysis system.
  • the analysis system includes: An analysis device; A management device for managing the analysis device; A portable information terminal that can communicate with the management device and includes an imaging unit that reads an image; With The management device is A first authentication unit that authenticates the worker and allows the authenticated worker to use the management device when the worker starts a management operation on the management device; An authentication information output unit for outputting an image including information on authentication of the worker authenticated by the first authentication unit; A second authentication unit that authenticates a worker based on the image read by the portable information terminal and permits the authenticated worker to use the management device via the portable information terminal; It is characterized by including.
  • an image including information related to the worker authentication is output, and when the output image is read by the portable information terminal, The worker is authenticated (second authentication) based on the image.
  • An authenticated worker is allowed to use the management device via the portable information terminal, and the worker can perform management work from the portable information terminal. That is, when an operator wants to perform management work from the portable information terminal, the worker can input authentication-related information easily and reliably by causing the portable information terminal to read an image and receive authentication (second authentication). .
  • the schematic diagram which shows the structure of an analysis system The block diagram which shows the structure of a management apparatus.
  • the figure which shows the structural example of the paper on which imaging authentication information was printed.
  • FIG. 1 is a schematic diagram showing the configuration of the analysis system 100.
  • FIG. 2 is a block diagram illustrating the configuration of the management apparatus 2.
  • FIG. 3 is a block diagram showing a configuration of the portable information terminal 3.
  • the analysis system 100 includes an analysis device 1, a management device (workstation) 2 that manages the analysis device 1, and a portable information terminal 3.
  • the management device 2 may manage one analysis device 1 or may manage a plurality of analysis devices 1. That is, the analysis system 100 may include a plurality of analysis apparatuses 1. In addition, the analysis system 100 may include a plurality of portable information terminals 3.
  • FIG. 1 shows one analysis device 1, one management device 2, and one portable information terminal 3 for convenience of explanation.
  • the analyzer 1 performs ionization by irradiating a target object (specifically, a sample to be analyzed) with a laser beam under vacuum to separate and detect flying ions according to a mass-to-charge ratio. It is an analysis device.
  • the management device 2 is a device that manages the analysis device 1, and creates analysis conditions, controls the analysis device 1, analyzes analysis data (data obtained by performing analysis with the analysis device 1), and the like.
  • the management device 2 is actually a computer. As shown in FIG. 2, a central processing unit (CPU) 21, a memory 22, a monitor (display device) 23 including an LCD (Liquid Crystal Display), etc.
  • An input unit 24 such as a keyboard and a mouse, a storage unit 25, and the like are connected to each other.
  • the memory 22 is configured by a volatile storage device such as a RAM (Random Access Memory), for example.
  • the storage unit 25 includes, for example, ROM (Read only Memory), flash memory, EPROM (Erasable Programmable ROM), EEPROM (registered trademark) (Electrically EPROM), HDD (Hard Disc Drive), SSD (Solid State Drive), and the like.
  • the storage unit 25 stores an OS (Operating System) that controls the overall operation of the management apparatus 2 and a program (management program) 200 for causing the computer to function as a management apparatus of the analysis system 100.
  • OS Operating System
  • the management program 200 includes a first authentication unit 201, an authentication information conversion unit 202, an authentication information output unit 203, and a second authentication unit 204. All of these are functional units realized by software by the CPU 21 reading the management program 200 into the memory 22 and executing it. These functional units 201, 202, 203, and 204 may be realized using dedicated hardware, but a general-purpose personal computer is used as a hardware resource and dedicated processing software installed on the personal computer is executed. This is generally realized by doing so.
  • the management device 2 includes an interface (I / F) 26 for direct connection with an external device and connection with the external device via a network such as a LAN (Local Area Network).
  • the management device 2 is connected to one or more analysis devices 1 via the I / F 26 via a network cable, a wireless LAN, or the like. Further, the management device 2 can communicate with one or more portable information terminals 3 from the I / F 26 via a wireless LAN, the Internet, or the like.
  • the portable information terminal 3 is an information terminal device that can be carried by an operator, and includes, for example, a smartphone, a tablet, a wristwatch type terminal, or the like. As shown in FIG. 3, the portable information terminal 3 includes a CPU (Central Processing Unit) 31 that is a central processing unit, a memory 32, a portable terminal screen 33 including a touch panel LCD, an SSD (Solid State Drive), and the like. A storage unit 34 composed of a large-capacity storage device, a camera 35 that can capture still images and moving images, and the like are connected to each other. The storage unit 34 stores an OS (Operating System) that controls the overall operation of the portable information terminal 3, various programs (application software), and the like.
  • OS Operating System
  • the portable information terminal 3 includes an interface (I / F) 36 for managing a direct connection with an external device and a connection with the external device through a network such as a wireless LAN (or the Internet). .
  • the portable information terminal 3 can communicate with the analysis apparatus 1 and the management apparatus 2 via this I / F 36 via a wireless LAN, the Internet, or the like.
  • FIG. 4 is a diagram showing the flow of the processing.
  • FIG. 5 is a diagram illustrating a configuration example of a screen (screen requesting input of authentication information) 230 displayed on the management apparatus 2.
  • FIG. 6 is a diagram illustrating a configuration example of the paper 8 on which the imaging authentication information is printed.
  • the first authentication unit 201 displays the screen 230 illustrated in FIG. 5 on the monitor 23 and requests the worker to input authentication information (step S1).
  • “Authentication information” is information required for an operator to use the management apparatus 2, and is issued in advance by a manager of the management apparatus 2 to a person who permits the use of the management apparatus 2, for example. ing.
  • the issued authentication information is registered in the storage unit 25.
  • the authentication information includes, for example, a combination of an ID (identification information) and a password, and each of the ID and password is, for example, an enumeration of multi-digit symbols (for example, alphanumeric characters).
  • the first authentication unit 201 receives the input. Then, it is determined whether or not the input authentication information matches the information (registration information) registered in the storage unit 25 (step S3).
  • the first authentication unit 201 authenticates the worker (first authentication) and uses the management device 2 to the worker. (Specifically, management work using the management device 2) is permitted (login) (step S4).
  • the worker is authenticated, for example, a screen for receiving various input operations related to the management work is displayed on the monitor 23, and the worker can perform various management work from the screen. . All management work performed by the worker using the management device 2 is recorded in association with the authentication information of the worker, and is stored in the storage unit 25 as an operation log.
  • a “method file” is a file that summarizes analysis conditions and the like.
  • analysis and analysis of a sample are performed according to a method file designated by an operator. That is, a series of processes of analysis and analysis performed according to one method file corresponds to one task in the analysis system 100.
  • the operator does not necessarily need to create a method file from scratch.
  • a method file created in the past can be selected and used as it is, or a part of a method file created in the past can be used. You may modify and use. Since the input unit 24 of the management apparatus 2 includes a keyboard, a mouse, and the like, the method file can be easily created, selected, modified, and the like by using these.
  • the authentication information conversion unit 202 subsequently handles the authenticated worker authentication information in a form that can be easily handled by the portable information terminal 3 (specifically, Image) (step S5).
  • the authentication information includes an ID and a password, both of which are in the form of a multi-digit symbol list, and the authentication information conversion unit 202 converts the ID into, for example, a barcode (illustrated).
  • the password is converted into a two-dimensional barcode 81, and the password is converted into, for example, a figure 82 using a predetermined algorithm.
  • the image obtained by each conversion includes information related to worker authentication.
  • it is preferable to consider the date etc. when the operator received 1st authentication for example. That is, even if the authentication information is the same, if the date and time when the first authentication is received is different, it is preferable that the authentication information is converted into a different image.
  • the authentication information output unit 203 outputs the authentication information (hereinafter also referred to as imaging authentication information) converted into an image by the authentication information conversion unit 202 (step S6).
  • the imaging authentication information may be output in any manner, but here, the imaging authentication information is printed on a medium such as paper by a printer (not shown) connected to the management apparatus 2.
  • FIG. 6 illustrates the paper 8 on which the imaging authentication information (that is, the barcode 81 indicating the ID and the graphic 82 indicating the password) is printed.
  • the operator can perform management work from the portable information terminal 3 by receiving the second authentication using the paper 8 on which the imaging authentication information is printed.
  • the worker can receive the second authentication only while the worker is logged in to the management apparatus 2. Therefore, after logging in to the management device 2 and performing the necessary management work from there, the worker leaves the management device 2 with the paper 8 while logged in to the management device 2.
  • the second authentication may be received at a necessary timing, and various management operations may be performed from the portable information terminal 3 at a location away from the management device 2.
  • FIG. 7 is a diagram showing the flow of the processing.
  • FIG. 8 is a diagram illustrating a configuration example of a screen (screen requesting input of imaging authentication information) 330 displayed on the portable information terminal 3.
  • the worker When the worker wants to perform management work using the management device 2 via the portable information terminal 3, the worker starts up the browser of the portable information terminal 3 and starts the management device 2 (specifically, the management device 2 from the browser). Is accessed (step S11).
  • the management apparatus 2 separately holds a home page (address) corresponding to each analysis apparatus 1, and the operator himself / herself is a management target from the browser. The homepage corresponding to the analyzer 1 is accessed.
  • the management device 2 requests authentication information from the mobile information terminal 3 (step S13). Specifically, the web screen 330 illustrated in FIG. 8 is displayed on the mobile terminal screen 33, and the operator of the mobile information terminal 3 is requested to input imaging authentication information.
  • the paper 8 on which the imaging authentication information is printed is issued to the worker who has received the first authentication. Therefore, the worker reads (captures) the barcode 81 printed on the paper 8 with the camera 35 of the portable information terminal 3. As a result, the barcode 81 is input to the portable information terminal 3. Further, the operator traces the same shape as that of the figure 82 in the figure input area 331 on the screen 330 while looking at the figure 82 printed on the paper 8. Thereby, the figure 82 is touch-panel input to the portable information terminal 3.
  • the portable information terminal 3 specifies the authentication information from the input imaging authentication information (step S15). Specifically, the portable information terminal 3 analyzes the barcode 81 and reads the ID from the barcode 81 and identifies the password that is the conversion source from the graphic 82. As described above, in this embodiment, each of the ID and the password is, for example, an enumeration of multi-digit symbols.
  • the portable information terminal 3 transmits the specified authentication information to the management device 2 (step S16).
  • the second authentication unit 204 of the management device 2 determines whether or not the received authentication information (specifically, ID and password) matches the registration information, Further, it is determined whether or not the worker related to the authentication information is logging in to the management apparatus 2 (step S18).
  • the second authentication unit 204 authenticates the worker. Then (second authentication), the worker is permitted to use the management device 2 via the portable information terminal 3 (step S19).
  • the mobile terminal screen 33 is permitted to display, for example, a web screen for receiving various input operations related to the management work (step S20).
  • the worker can perform various management operations from the screen (step S21). That is, various operations performed by the worker from the web screen of the portable information terminal 3 are received by the portable information terminal 3, transmitted to the management apparatus 2, and reflected as management work in the management apparatus 2. That is, the worker can perform various management operations from the portable information terminal 3. All of the management work performed by the worker via the portable information terminal 3 is recorded in association with the authentication information of the worker and is stored in the storage unit 25 of the management device 2 as an operation log.
  • the worker can modify the method file from the portable information terminal 3, for example. Further, for example, the worker can input an instruction for starting execution of the task specified by the method file from the portable information terminal 3 using the analysis apparatus 1.
  • the worker who has received the second authentication has a specific method file (specifically, the method file targeted by the management work performed by the management apparatus 2 after the worker has received the first authentication). It is preferable that only management work is permitted and management work related to other method files is prohibited. Thus, by limiting the scope of management work via the portable information terminal 3, the safety level of the management state of the analysis system 100 can be increased.
  • the authentication information used for the first authentication is an enumeration of multi-digit symbols, which are output after being converted into an image, and the image is used for the second authentication.
  • the authentication information is facilitated and safety is enhanced.
  • a single operator associates a log of management work performed from the management device 2 and a log of management work performed via the portable information terminal 3 with a single piece of authentication information as a series of operation logs. Since it can be left, log information can be easily managed.
  • the operator when the operator holds the printed paper 8 and wants to perform management work from the portable information terminal 3, the operator prints the barcode 81 printed on the paper 8. And can receive the second authentication. According to this configuration, the worker can receive the second authentication at an arbitrary timing.
  • the worker is permitted to use the management device 2 via the portable information terminal 3 only while the worker is logged in to the management device 2. Therefore, the risk that another person illegally uses the management device 2 via the portable information terminal 3 is reduced.
  • the authentication information conversion unit 202 converts each ID and password in the form of a multi-digit symbol sequence into the two-dimensional barcode 81 and the figure 82.
  • the authentication information is converted into an image.
  • the mode of conversion is not limited to this.
  • one or both of the ID and password may be converted into a two-dimensional barcode, a one-dimensional barcode, or a graphic.
  • the output of the imaging authentication information is not limited to printing on a medium such as paper.
  • the imaging authentication information may be output by being displayed on the monitor 23 of the management apparatus 2.
  • the operator directly captures (inputs) the barcode 81 on the portable information terminal 3 by directly capturing the screen on which the imaging authentication information is displayed with the camera 35 of the portable information terminal 3.
  • second authentication can be received.
  • the imaging authentication information may be output in two or more modes.
  • the imaging authentication information may be printed on a medium such as paper and displayed on the monitor 23 of the management apparatus 2.
  • the authentication information specified by the portable information terminal 3 is transmitted from the portable information terminal 3 to the management device 2, and the management device 2 determines whether the authentication information matches the registration information. 7 (step S16 to step S19 in FIG. 7), at least a part of these processes may be performed by the portable information terminal 3. For example, whether the portable information terminal 3 makes an inquiry to the management device 2 as to whether or not the specified authentication information matches the registered information, and whether the portable information terminal 3 authenticates in response to a response from the management device 2 It may be determined whether or not.
  • the mobile information terminal 3 specifies the authentication information from the imaging authentication information (step S15 in FIG. 7), but this process may be performed by the management device 2. That is, imaging authentication information may be transmitted from the portable information terminal 3 to the management device 2 and the authentication information may be specified from the imaging authentication information received by the management device 2.
  • the authentication information when transmitting the authentication information from the portable information terminal 3 to the management device 2 (step S16 in FIG. 7), the authentication information is sent from the portable information terminal 3 to the management device 2 via the analysis device 1.
  • the structure which transmits may be sufficient.
  • the management device 2 transmits various types of information related to the method file managed by the worker to the portable information terminal 3 of the worker. Also good. For example, the progress of the process in the analysis apparatus 1 or the management apparatus 2 (the progress of the process related to the method file) from the management apparatus 2 to the portable information terminal 3 (the portable information terminal 3 of the worker who has received the second authentication) May be sent. According to this configuration, the operator does not need to periodically go to the management device 2 (or the analysis device 1) to check the progress of the process.
  • the operator can quickly be made aware of an abnormality that has occurred in the analysis device 1 or the management device 2.
  • the output of the imaging authentication information (step S6 in FIG. 4) may be executed only in response to an instruction from the worker in response to the instruction.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Chemical & Material Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Biochemistry (AREA)
  • General Health & Medical Sciences (AREA)
  • Immunology (AREA)
  • Pathology (AREA)
  • General Factory Administration (AREA)

Abstract

La présente invention concerne une technologie qui rend une tâche de gestion à l'aide d'un terminal d'informations mobile facile par l'exécution d'une authentification avec certitude au moyen d'un procédé plus simple dans un cas où une tâche de gestion à l'aide d'un terminal d'informations mobile est exécutée de façon distincte d'une tâche de gestion à l'aide d'un dispositif de gestion destiné à gérer un dispositif d'analyse. Ce procédé de gestion pour un système d'analyse (100) comprend : une première étape d'authentification consistant, lorsqu'un travailleur qui utilise un dispositif de gestion (2) qui gère un dispositif d'analyse (1) doit commencer une tâche de gestion à l'aide du dispositif de gestion (2), à authentifier le travailleur et à permettre au travailleur authentifié d'utiliser le dispositif de gestion (2) ; une étape de sortie consistant, après l'exécution de l'authentification du travailleur, à transmettre une image comportant des informations se rapportant à l'authentification du travailleur ; une étape de lecture consistant à lire l'image à l'aide d'un terminal d'informations mobile (3) ; et une seconde étape d'authentification consistant à authentifier le travailleur sur la base de l'image lue et à permettre au travailleur authentifié d'utiliser le dispositif de gestion (2) par le biais du terminal d'informations mobile (3).
PCT/JP2016/065217 2015-08-27 2016-05-23 Procédé permettant de gérer un système d'analyse et système d'analyse Ceased WO2017033515A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2015167782 2015-08-27
JP2015-167782 2015-08-27

Publications (1)

Publication Number Publication Date
WO2017033515A1 true WO2017033515A1 (fr) 2017-03-02

Family

ID=58099828

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2016/065217 Ceased WO2017033515A1 (fr) 2015-08-27 2016-05-23 Procédé permettant de gérer un système d'analyse et système d'analyse

Country Status (1)

Country Link
WO (1) WO2017033515A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022181589A1 (fr) * 2021-02-26 2022-09-01 京都電子工業株式会社 Appareil d'analyse et système de support d'appareil d'analyse l'utilisant

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007034443A (ja) * 2005-07-22 2007-02-08 Konica Minolta Business Technologies Inc 画像形成システム、画像形成装置及び画像形成処理方法
JP2013148519A (ja) * 2012-01-20 2013-08-01 Shimadzu Corp 分析装置制御システム
JP2014194401A (ja) * 2013-03-29 2014-10-09 Sysmex Corp 検体分析装置管理システム、検体分析装置用管理装置、及びコンピュータプログラム

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007034443A (ja) * 2005-07-22 2007-02-08 Konica Minolta Business Technologies Inc 画像形成システム、画像形成装置及び画像形成処理方法
JP2013148519A (ja) * 2012-01-20 2013-08-01 Shimadzu Corp 分析装置制御システム
JP2014194401A (ja) * 2013-03-29 2014-10-09 Sysmex Corp 検体分析装置管理システム、検体分析装置用管理装置、及びコンピュータプログラム

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022181589A1 (fr) * 2021-02-26 2022-09-01 京都電子工業株式会社 Appareil d'analyse et système de support d'appareil d'analyse l'utilisant
JPWO2022181589A1 (fr) * 2021-02-26 2022-09-01

Similar Documents

Publication Publication Date Title
US20140359752A1 (en) Web-based data and instrument management solution
US20130326580A1 (en) Methods and apparatus for creating and implementing security policies for resources on a network
US20130139233A1 (en) System and method for controlling user access to a service processor
CN109313674B (zh) 软件许可证管理系统以及管理方法
AU2016278352B2 (en) A system and method for use in regression testing of electronic document hyperlinks
JP6414876B2 (ja) 実験系支援システム
US10362090B2 (en) Automating a process associated with a web based software application
CN114548944A (zh) 设备智能管理方法、系统、电子设备及介质
US20250336192A1 (en) Neural Network Host Platform for Detecting Anomalies in Cybersecurity Modules
CN102291422A (zh) 一种远程实验平台的搭建方法
KR101725301B1 (ko) 보안 취약점 훈련 시스템
JP2013201571A5 (fr)
WO2017033515A1 (fr) Procédé permettant de gérer un système d'analyse et système d'analyse
JP7320211B1 (ja) ウェブサイトの脆弱性を検査するためのシステム、方法、及びプログラム
CN112632362A (zh) 一种国网信息管理系统自动巡视方法及巡视平台
JP2018074232A (ja) 情報処理システムおよび情報処理方法
JP5776206B2 (ja) 承認手段を備えた分析システム
JP5737249B2 (ja) 負荷シミュレーション装置、シミュレーション装置、負荷シミュレーション方法、シミュレーション方法及びプログラム
WO2024232110A1 (fr) Système, procédé et programme d'inspection de vulnérabilité de site web
CN106709315B (zh) 一种应用系统的登录信息验证方法和装置
JP2013167593A (ja) 分析装置制御システム及びプログラム
JP5534514B2 (ja) 情報処理装置、情報処理方法、及びプログラム
JP2010140071A (ja) 情報システム
JP6079147B2 (ja) ログイン処理システム、ログイン認証処理装置、ログイン認証処理装置の制御プログラム、ログイン処理方法
US20160171445A1 (en) Self-service data importing

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16838862

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16838862

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP