HIS status display view shows HIS hardware configuration and operating status. 1. Display host information and hardware interface status (such as Ethernet, USB)
2. Monitor hardware parameters such as fans, hard drives, temperature, etc
3. Support switching control bus effectiveness
HIS settings window configuration HIS operating parameters 1. 18 configuration tags (display, printer, buzzer, alarm, trend, etc.)
2. Support multi monitor settings, customizable function keys, and report parameter configuration
3. Some configurations require a restart of HIS to take effect
(2) Security control system
Adopting a dual layer architecture of "CENTUM dedicated security+Windows IT security" to ensure operational and data security:
1. CENTUM dedicated security
User three attributes:
Username: Unique identifier for the operator, associated with operation logs and password
User group: Define the scope of operation monitoring (such as specific FCS, windows, factory areas)
User permissions: subdivided operation levels, default 3 levels of standard permissions+7 levels of custom permissions
Permission level monitoring permission operation permission engineering permission
S1 (ordinary operator) present or absent
Is S2 (Senior Operator) available
S3 (Engineer) Yes Yes Yes Yes
U1-U7 (custom) configurable configurable configurable
Fine grained control granularity:
Function block level: Modification of important function block parameters requires secondary confirmation, and operation permissions can be temporarily disabled
Window level: Restrict operations such as modifying graphical view dashboards and adjusting trend view parameters
Tag level: Tag priority (important/normal/auxiliary 1/auxiliary 2), differentiated alarm processing
Advanced security features:
User lockout: Multiple password errors trigger system alarm, which can lock illegal login accounts
Password expiration: password expiration period can be set, with a 14 day reminder before expiration
Prohibition of duplicate passwords: Historical passwords cannot be used when changing passwords
Automatic logout: Automatically log out after no operation timeout
2. Windows IT Security
Security Model: Provides 3 models to adapt to different scenarios
Model Type Core Defense Scope Applicable Scenarios
Traditional models lack reinforcement and prioritize compatibility with legacy products for upgrading old systems, requiring compatibility with old devices
Standard model defense against network attacks and direct operational attacks in conventional industrial scenarios, balancing security and compatibility
Strengthen model defense against network attacks, direct operation attacks, and high security scenarios such as component/data theft (such as petroleum and chemical industries)
Authentication mode:
Windows authentication mode: integrates Windows account and HIS operation permissions, supports domain management and single sign on
Single sign on method: Windows login automatically synchronizes HIS login; Or the system can automatically log in to Windows and HIS can be started with the lowest privilege
Communication control: Restrict communication types and ports through Windows firewall and DCOM settings to defend against network attacks
Applicable scenarios and core values
(1) Applicable industries and scenarios
Industry scope: Process industries such as petroleum refining, chemical, steel, food, and electricity
Core scenario:
Real time operation monitoring: device start stop, parameter adjustment, status observation
Alarm management: Multi system alarm integration, critical alarm screening, alarm processing guidance
Data tracing: trend data query, historical alarm archiving, production report generation
Remote operation and maintenance: remote factory monitoring, remote parameter adjustment, troubleshooting
(2) Core values
Improve operational efficiency: ergonomic design+multi window parallel display, reducing operational steps and switching costs
Ensuring system security: dual layer security control+refined permissions to prevent illegal operations and data leakage
Reduce the difficulty of operation and maintenance: remote operation and maintenance+intelligent alarm management, reducing on-site duty and fault handling time
Strengthen data support: report function+trend analysis, providing data basis for production optimization

Email:wang@kongjiangauto.com