PDM/PLM(TCEng) software system installs complete pilot research and application

  • Time:
  • Click:73
  • source:GAENOR CNC Machining
PDM/PLM(TCEng) is it is a foundation with software, cover the management of all processes in product lifecycle and data. The safety of PDM/PLM(TCEng) system is to rely on attestation, visit control, audit, add wait for a variety of technologies closely joint efforts will assure. Visitting control technology is the central segment of systematic safety, it assured a system to use gender and usability the confidential sex of data, security, integrality, easily. <script Language=javascript>document.

Write(mypuiblicgg());</script> 1 introductive PDM/PLM(TCEng) is it is a foundation with software, cover the management of all processes in product lifecycle and data. The security of PDM/PLM(TCEng) system is to rely on systematic safety attestation, visit audit of attributive of regular control, visit, database and data file are added wait for a variety of technologies closely joint efforts will assure. Visitting regular control is the central segment of systematic safety, it assured a system to use gender and usability the confidential sex of data, security, integrality, easily. The visit regulation of TCEng information system controls a model is model of control of attributive of the attributive control model that is based on matrix model, part, job shedding the integrated application that wait. Show the actual application according to the enterprise, management and control do the safety to TCEng information system to be elaborated simply. 2 personnel manage model A.

Speak of systematic attributive management, must introduce TCEng system personnel simply to run a model first, TCEng system personnel manages a model to form by 3 element: Group, part, user. Group: Be based on the combination of a flock of users of the project, many parts can be included in a group; Can put in the hierarchy of the group, have father group and child group; An user must belong to a group at least (default group) . Part: Be based on the combination of a flock of users of duty, they embody sort of the job in designing a process, what skill and duty divide the work is different, ; of the member that be like the member that design, craft attends the user of project group, can assume a variety of roles in project group. Namely the station that every user has him to be in, an every kinds of part in TCEng system is actual and corresponding post, be similar to post or title, use at the different duty of the member in divisional group. User: The user in TCEng system belongs to different group with some kind of part; An user can own a variety of different parts, an user also can be many groups member. B.

In TCEng system, the user of different group, different role all can have the following limits of authority: Examine individual email, delete the content in him mailbox, mailbox medium content is copied or shift arrives in other folder; To the middle of the system any users send email; Examine the condition of the documentation that oneself have; Below the case that has limits of authority, undertake operating to documentation (read, write, delete, duplicate, flow extends wait) a moment; Below the case that has limits of authority, inquire documentation according to attribute content; Below the case that has limits of authority, the place that changes documentation by formulary program belongs to authority; Below the case that has limits of authority, undertake the execution of flow is operated working; ... ... at the same time, include systematic manager inside, all cannot carry out the operation beyond attributive. The employee of use TCEng system must enter TCEng system through ability of user of a TCEng. Build the basic personnel origanization construction of TCEng system, need 3 data document " group (Group) is expressed " , "Part (Role) express " , "User (User) express " . Of name of group, part, user specific name regulation to be ordered by the standardization division system of the enterprise. The management of attributive of system of TCEng of control of attributive of 3 TCEng system controls user logarithm to occupy the visit of documentation through two kinds of means: Object-oriented visit is controlled and be based on attributive regulation to execute classification to visit control according to the object for fundamental logarithm. Among them regular pattern is a kind most fundamental attributive runs way, visit in regular pilot (Rule_based Access) in control, can belong to user or group according to the condition with data current target, type, place 3 attribute unite the personnel limits that can access this data certainly. TCEng system is passed access regular define table, initialization attributive model. The visit control that is based on a part was used in TCEng system, an user must be landed with some kind of part, ability gets corresponding limits of authority. 3. Initialization of attributive of 1 TCEng system is in in TCEeng system in product lifecycle product data from establish file position, must change through 3 phase condition, condition of these 3 phase is: REleased----Extended, already formal, must not revise forever, be in " file " condition; In-Process------In flow, half formal, revise must classics license; Working-----In the job, not fixed, classics regular meeting is revised, control lawful person to undertake lawful modification. TCEeng system is carried out in the begining, must initialization model of attributive of system of 3 phase state. TCEeng system dominates list through accessing attributive to visit (initialization of ACL) implementation system. Following attributive visits dominate list (the actual application that ACL) is an enterprise: The attributive after documentation file installs as follows: Note: If do not have this attributive to be used " 0 " express, if have,use " 1 " express. 3. Management of attributive of 2 TCEng system is become initialization after model of attributive of system of 3 phase state, want to control the limits of authority that basically controls fashion according to the real need of project group staff sometimes. If want to revise the attributive of file condition, enter a system with systematic manager identity, to visit controller, below HAS STATUS()->VAULT modification condition is HAS STATUS, value to return to call VAULT_F for name of archives, ACL, add to OWNING USER and WORLD, delete attributive regulation entry, following plan institute show: A.

A few what should notice when management basically controls the limits of authority of means: For safe for the purpose of, before modification attributive, should manage the visit implement in regular tree backup. Attributive regulation cultivates medium attributive to disable to systematic manager. Do not revise the setting of object of data of relative interconnected system. Do not revise the setting that is located in a layer. Do not alter the document that installs about attributive by hand. Attributive is regular as far as possible simple, use the limits of authority of Status as far as possible. B.

The meaning with the specific limits of authority that fashion basically controls in attributive regulation tree among them reachs his first step is as follows: "Read " (Read) the right includes to inquire, browse; "Write " (the right of Write) includes to inquire, browse, revise; "Cutout " (Delete) the right points to from the database forever purify this object; "Change " (Change) the right points to in careful wholesale let off Cheng Zhongke to be installed in order to change the current right of the object; "Upgrade " (Promote) it is OK in working flow that the right points to span intermediate measure advances a certain designation position; "Demote " (Demote) it is OK in working flow that the right points to span intermediate measure returns a certain appointed position; "Copy " (Copy) what the right points to is to be able to be denied turn this object put for another object; "Replace " (the right of ChangeOwner) points to the Ownership that changes a target; "Subscription " (Subscribe) the right shows whether this object can subscribe to this object, produce specific operation when this object thereby when, inform subscription of the person. C.

The first step of the condition in regular tree is the regulation that a layer stands by more on same arrangement have priority than lower regulation; Child the conditional precede over in branch father branch. Applicable object (Accessor) following plan institute show the logistic and first step that accesses attributive, ordinal be: Approver(RIG) : Have those who appoint part and team to examine and approve personnel at the same time, RIG is the abbreviate of RoleInGroup; Approver(Role) : Have those who specify a part to examine and approve personnel; Approver(Group) : Have appoint the examination of the group personnel; Approver: Examine and approve personnel; OwningUser: The object is possessory; User: Designation user GroupAdministrator: The object makes the group leader that personnel is in; RoleinOwningGroup: The staff that assigns a part is possessed in the group that the member that the object makes a person is in; RoleinGroup: Appoint the staff that assigns a part is possessed in the group; Role: Possess the staff that assigns a part; OwningGroup: The object builds the staff of the group that personnel is in; SystemAdministrator: Systematic manager Group: Assign the staff of the group; World: All and other personnel. D.

The first step that basically controls fashion among them is as follows: MostPrecedence: Highest and first step, the limits of authority that sets to faster first step does not agree with inferior first step. LeastPrecedence: Lowest is preferential class, the limits of authority that sets to small first step may agree with faster first step. 3.

3TCEng system data accesses attributive to control TCEng system to be opposite all objects in its database (sheet of Item, file, watch, blueprint) execute the visit that is based on company business regulation to control (Rule_basedAccess) . Following plan institute show: Data object basis its current condition (designing, examining and approve, file condition) , data type (watch of parameter of graph of blueprint, general assembly, design, use manual) , what belong to an user or group (the personnel that generates this data) 3 attribute, the access that dominates this data namely controls limits. The enterprise should need according to oneself, program data security is confidential control a system. 3. 4 TCEng system coils mechanism of protection of attributive of administrative TCEng system uses affirmatory user to be opposite of TCEng system object read / write a visit, an user accessed attributive to decide the file will be deposited to what coil in where, after founding to coil, all users in TCEng system have read limits of authority, can award user place to belong to group write attributive to what coil, such users are coiling filestore. The use regulation that has as follows coils in the meantime: Coiling is the list that dominates the operating system below by TCEng system. The user establishs a new data set (Dataset) , the filestore of its place correspondence coils in TCEng in. The user can not visit the data file that coil directly, can visit the file in coiling through TCEng only, the visit that coil is controlled by IMANFS. A data coils to be able to be controlled by a database only, data coils can go up in any machines on the network. The attribute that coil includes to coil renown, machine node date, roll the catalog name of the place. Will coil on the file server that is put in a large concentration, for each project group allocation coils. Same data can be used to coil on NIX and VMS machine (Volume) , need to adopt network file system only (NFS) will come true. UNIX operating system uses NFS means to seek the data on questionnaire commonly. NT uses Imanfs to seek the data on questionnaire. 3.

5The security to assure data mixes Check-In/Check-out usability, TCEng system is right enclosed data set (DataSet) the file offers check to enter / the mechanism that check gives (Check-in/Check-out) , prevent much person to be revised at the same time same a data file, ensure without conflict in group of a project the ground uses product data. The day-to-day modification state of affairs that TCEng system tracks data file automatically (Version) , can withhold a few Version according to industry standard set by systematic manager, general reservation is the closest 3 revise (can withhold 20 Version at most, should note the difference of the version Revision of the Version of here and Item: Version is saved on behalf of what revise to the every time of Dataset, assure automatically by the system; And the order in which editions are printed that Revision changes on behalf of the project, litre of edition that has version by user handiwork) . It is below the circumstance normally in TCEng system by the Item of Check-out, cannot save after revise, enter Item check first only (operation of the ability after Check-in) . 4 last words are narrated on put together, TCEng system regards an enterprise as all-around administrative platform, assure the attributive management of strict TCEng system and control are systematic security at all, in order to be the initiative job of system of enterprise executive PDM/PLM, carry out basic not be in a position follow-uply to mention otherwise. CNC Milling CNC Machining