TWI827229B - Automated construction system - Google Patents

Automated construction system Download PDF

Info

Publication number
TWI827229B
TWI827229B TW111133013A TW111133013A TWI827229B TW I827229 B TWI827229 B TW I827229B TW 111133013 A TW111133013 A TW 111133013A TW 111133013 A TW111133013 A TW 111133013A TW I827229 B TWI827229 B TW I827229B
Authority
TW
Taiwan
Prior art keywords
information
virtual robot
account
password
automated construction
Prior art date
Application number
TW111133013A
Other languages
Chinese (zh)
Other versions
TW202411868A (en
Inventor
張婉君
楊舒惠
郭帥逸
邱國禎
Original Assignee
合作金庫商業銀行股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 合作金庫商業銀行股份有限公司 filed Critical 合作金庫商業銀行股份有限公司
Priority to TW111133013A priority Critical patent/TWI827229B/en
Application granted granted Critical
Publication of TWI827229B publication Critical patent/TWI827229B/en
Publication of TW202411868A publication Critical patent/TW202411868A/en

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Manipulator (AREA)
  • Automatic Assembly (AREA)

Abstract

An automated construction system includes an account password generator, an encrypted memory and a processor. The encryption memory is coupled to the account password generator, and is configured for storing a plurality of computer-readable instructions. The processor is coupled to the encrypted memory and configured for reading the plurality of computer-readable instructions to execute the first virtual robot. The processor generates a first account password data by the account password generator according to the first virtual robot and stores the first account password data in the encrypted memory. The first virtual robot obtains the first account password data from the encrypted memory and connects to the financial server according to the first account password data.

Description

自動化建構系統automated construction system

本案係有關於一種建構系統,且特別是關於一種自動化建構系統。This case relates to a construction system, and in particular to an automated construction system.

現行,RPA流程自動化技術(Robot Process Automation, RPA)可取代人為操作電腦畫面執行重複步驟,但透過RPA登入各應用系統取用資料仍須具備該系統之帳號密碼權限。若提供RPA使用職員自身之帳號密碼,而職員自身之帳號密碼可能同時擁有其他額外權限,造成資料外流的風險擴大。Currently, RPA process automation technology (Robot Process Automation, RPA) can replace the manual operation of computer screens to perform repetitive steps. However, logging into each application system through RPA to access data still requires the account and password authority of the system. If RPA is provided to use the employee's own account and password, the employee's own account and password may also have other additional permissions, which will increase the risk of data leakage.

此外,職員自身之帳號密碼需要定期更新,以維護資安。若同時將職員自身之帳號密碼提供給RPA使用,易造成RPA使用到舊的帳號密碼,造成無法登入。In addition, employees’ own account passwords need to be updated regularly to maintain information security. If the employee's own account and password are provided to RPA at the same time, it is easy for RPA to use the old account and password, making it impossible to log in.

再者,若登入之系統本身不支援同一時間使用同一組帳號密碼登入,則RPA尚需與職員錯開使用系統的時間,造成使用上相當不便。Furthermore, if the system you are logging into does not support logging in using the same account and password at the same time, the RPA will still need to stagger the time when employees use the system, causing considerable inconvenience in use.

發明內容旨在提供本揭示內容的簡化摘要,以使閱讀者對本揭示內容具備基本的理解。此發明內容並非本揭示內容的完整概述,且其用意並非在指出本案實施例的重要/關鍵元件或界定本案的範圍。This summary is intended to provide a simplified summary of the disclosure to provide the reader with a basic understanding of the disclosure. This summary is not an extensive overview of the disclosure, and it is not intended to identify key/critical elements of the embodiments or to delineate the scope of the disclosure.

本案內容之一技術態樣係關於一種自動化建構系統。自動化建構系統包含帳號密碼生成器、加密記憶體及處理器。加密記憶體耦接於帳號密碼生成器,並用以儲存複數個電腦可讀取指令。處理器耦接於加密記憶體,並用以讀取複數個電腦可讀取指令以執行第一虛擬機器人。處理器根據第一虛擬機器人以藉由帳號密碼生成器生成第一帳號密碼資訊並儲存於加密記憶體。第一虛擬機器人於加密記憶體獲取並根據第一帳號密碼資訊以連線至金融伺服器。One of the technical aspects of this case relates to an automated construction system. The automated construction system includes an account and password generator, encrypted memory and processor. The encrypted memory is coupled to the account password generator and used to store a plurality of computer-readable instructions. The processor is coupled to the encrypted memory and used to read a plurality of computer readable instructions to execute the first virtual robot. The processor generates the first account password information through the account password generator according to the first virtual robot and stores it in the encrypted memory. The first virtual robot obtains from the encrypted memory and connects to the financial server based on the first account password information.

因此,根據本案之技術內容,本案實施例所示之自動化建構系統得以讓虛擬機器人擁有綁定的帳號密碼與相應的權限,以達到虛擬機器人能與職員皆能登入系統的效果。Therefore, according to the technical content of this case, the automated construction system shown in the embodiment of this case allows the virtual robot to have a bound account password and corresponding permissions, so as to achieve the effect that both the virtual robot and employees can log in to the system.

在參閱下文實施方式後,本案所屬技術領域中具有通常知識者當可輕易瞭解本案之基本精神及其他發明目的,以及本案所採用之技術手段與實施態樣。After referring to the following embodiments, those with ordinary knowledge in the technical field to which this case belongs can easily understand the basic spirit and other purposes of the invention, as well as the technical means and implementation styles adopted in this case.

為了使本揭示內容的敘述更加詳盡與完備,下文針對了本案的實施態樣與具體實施例提出了說明性的描述;但這並非實施或運用本案具體實施例的唯一形式。實施方式中涵蓋了多個具體實施例的特徵以及用以建構與操作這些具體實施例的方法步驟與其順序。然而,亦可利用其他具體實施例來達成相同或均等的功能與步驟順序。In order to make the description of this disclosure more detailed and complete, the following provides an illustrative description of the implementation aspects and specific embodiments of this case; but this is not the only form of implementing or using the specific embodiments of this case. The embodiments cover features of multiple specific embodiments as well as method steps and their sequences for constructing and operating these specific embodiments. However, other specific embodiments may also be used to achieve the same or equivalent functions and step sequences.

除非本說明書另有定義,此處所用的科學與技術詞彙之含義與本案所屬技術領域中具有通常知識者所理解與慣用的意義相同。此外,在不和上下文衝突的情形下,本說明書所用的單數名詞涵蓋該名詞的複數型;而所用的複數名詞時亦涵蓋該名詞的單數型。Unless otherwise defined in this specification, the scientific and technical terms used herein have the same meanings as commonly understood and customary by a person with ordinary knowledge in the technical field to which the subject matter belongs. In addition, unless there is conflict with the context, the singular noun used in this specification covers the plural form of the noun; and the plural noun used also covers the singular form of the noun.

另外,關於本文中所使用之「耦接」或「連接」,可指二或多個元件相互直接作實體或電性接觸,或是相互間接作實體或電性接觸,亦可指二或多個元件相互操作或動作。In addition, as used herein, "coupling" or "connection" may refer to two or more components that are in direct physical or electrical contact with each other, or that are in indirect physical or electrical contact with each other, or it may also refer to two or more components that are in direct physical or electrical contact with each other. components interact or act with each other.

在本文中,用語『電路』泛指由一或多個電晶體與/或一或多個主被動元件按一定方式連接以處理訊號的物件。In this article, the term "circuit" generally refers to an object that is connected in a certain manner by one or more transistors and/or one or more active and passive components to process signals.

在說明書及申請專利範圍中使用了某些詞彙來指稱特定的元件。然而,所屬技術領域中具有通常知識者應可理解,同樣的元件可能會用不同的名詞來稱呼。說明書及申請專利範圍並不以名稱的差異做為區分元件的方式,而是以元件在功能上的差異來做為區分的基準。在說明書及申請專利範圍所提及的「包含」為開放式的用語,故應解釋成「包含但不限定於」。Certain words are used in the specification and patent claims to refer to specific components. However, those with ordinary skill in the art will understand that the same components may be referred to by different names. The specification and the patent application do not use the difference in name as a way to distinguish components, but the difference in function of the components as the basis for distinction. The "include" mentioned in the specification and the scope of the patent application is an open-ended term, so it should be interpreted as "include but not limited to".

第1圖係依照本案一實施例繪示一種自動化建構系統的方塊示意圖。如圖所示,自動化建構系統100包含帳號密碼生成器110、加密記憶體120及處理器130。於連接關係,加密記憶體120耦接於帳號密碼生成器110,處理器130耦接於加密記憶體120。Figure 1 is a block diagram illustrating an automated construction system according to an embodiment of the present invention. As shown in the figure, the automated construction system 100 includes an account password generator 110, an encryption memory 120 and a processor 130. In connection relationship, the encrypted memory 120 is coupled to the account password generator 110 , and the processor 130 is coupled to the encrypted memory 120 .

為達到虛擬機器人能與職員皆能登入系統的效果,本案提供如第1圖所示之自動化建構系統100,其相關操作詳細說明如後所述。In order to achieve the effect that both virtual robots and employees can log in to the system, this project provides an automated construction system 100 as shown in Figure 1, and its related operations are described in detail later.

於操作上,在一實施例中,加密記憶體120用以儲存複數個電腦可讀取指令。然後,處理器130用以讀取複數個電腦可讀取指令以執行第一虛擬機器人。舉例而言,第一虛擬機器人可以為機器人流程自動化(Robot Process Automation, RPA)演算法或程式,但本案不以此為限。此外,第一虛擬機器人可以稱為虛擬行員,此虛擬行員可以具有真實職員的身份與相關權限,但本案不以此為限。In operation, in one embodiment, the encrypted memory 120 is used to store a plurality of computer-readable instructions. Then, the processor 130 is used to read a plurality of computer-readable instructions to execute the first virtual robot. For example, the first virtual robot can be a Robot Process Automation (RPA) algorithm or program, but this case is not limited to this. In addition, the first virtual robot can be called a virtual clerk, and this virtual clerk can have the identity and relevant permissions of a real employee, but this case is not limited to this.

在一實施例中,處理器130根據第一虛擬機器人以藉由帳號密碼生成器110生成第一帳號密碼資訊並儲存於加密記憶體120。舉例而言,處理器130可以將第一虛擬機器人與帳號密碼生成器110生成的第一帳號密碼資訊綁定,使此第一帳號密碼資訊為第一虛擬機器人專用,並為了維護資安,處理器130再將此第一帳號密碼資訊儲存於加密記憶體120,若要從外部應用程式檢視此第一帳號密碼資訊,需要通過加密記憶體120的資安檢查,但本案不以此為限。In one embodiment, the processor 130 generates the first account password information through the account password generator 110 according to the first virtual robot and stores it in the encrypted memory 120 . For example, the processor 130 can bind the first virtual robot with the first account and password information generated by the account and password generator 110, so that the first account and password information is exclusive to the first virtual robot, and in order to maintain information security, process The device 130 then stores the first account password information in the encrypted memory 120. If you want to view the first account password information from an external application, you need to pass the security check of the encrypted memory 120, but this case is not limited to this.

在一實施例中,第一虛擬機器人於加密記憶體120獲取並根據第一帳號密碼資訊以連線至金融伺服器900。舉例而言,上述的第一帳號密碼資訊為第一虛擬機器人專用,故第一虛擬機器人可以直接於加密記憶體120中獲取此第一帳號密碼資訊,且第一虛擬機器人可以將此第一帳號密碼資訊輸入並連線於金融伺服器900,但本案不以此為限。In one embodiment, the first virtual robot obtains and connects to the financial server 900 based on the first account password information from the encrypted memory 120 . For example, the above-mentioned first account password information is exclusive to the first virtual robot, so the first virtual robot can directly obtain the first account password information in the encrypted memory 120, and the first virtual robot can use the first account password The password information is entered and connected to the financial server 900, but this case is not limited to this.

在一實施例中,處理器130根據第一虛擬機器人及時間週期以藉由帳號密碼生成器110生成第二帳號密碼資訊並儲存於加密記憶體120。舉例而言,時間週期可以為6個月,當第一虛擬機器人已使用第一帳號密碼資訊有6個月時,處理器130可以再次藉由帳號密碼生成器110生成第一虛擬機器人專用的第二帳號密碼資訊(即新帳號密碼資訊),但本案不以此為限。此外,上述個新帳號密碼資訊可以每6個月被自動更新,但本案不以此為限。In one embodiment, the processor 130 uses the account password generator 110 to generate the second account password information according to the first virtual robot and the time period and stores it in the encrypted memory 120 . For example, the time period may be 6 months. When the first virtual robot has used the first account and password information for 6 months, the processor 130 may use the account and password generator 110 to generate a third password dedicated to the first virtual robot again. Second account password information (i.e. new account password information), but this case is not limited to this. In addition, the above new account password information can be automatically updated every 6 months, but this case is not limited to this.

在一實施例中,處理器130讀取複數個電腦可讀取指令以執行綁定演算法。綁定演算法用以綁定需求單位、流程及設備的其中至少一者。舉例而言,處理器130可以藉由綁定演算法以將第一虛擬機器人(或10台虛擬機器人)綁定於某一需求單位(例如:松山分行)、某一流程(例如:存款流程)或某一設備(例如:特定的電腦),以達到風險控制的效果。In one embodiment, the processor 130 reads a plurality of computer-readable instructions to execute the binding algorithm. The binding algorithm is used to bind at least one of the demand unit, process and equipment. For example, the processor 130 can bind the first virtual robot (or 10 virtual robots) to a certain demand unit (for example, Songshan Branch) or a certain process (for example, deposit process) through a binding algorithm. Or a certain device (for example: a specific computer) to achieve risk control effects.

在一實施例中,處理器130讀取複數個電腦可讀取指令以執行通知演算法。通知演算法用以傳遞建構完成資訊及建立系統權限資訊的其中至少一者。舉例而言,通知演算法可以將建構完成資訊傳遞至申請虛擬機器人的需求單位(例如:松山分行的外匯單位),通知演算法也可以將建立系統權限資訊傳遞給需要額外申請權限的單位(例如:國外部),例如,第一虛擬機器人僅擁有行政業務的權限,但被呼叫做外匯相關的業務,然而第一虛擬機器人沒有執行外匯業務的權限,故通知演算法可以協助將第一虛擬機器人需要開通外匯業務權限的資訊傳遞給國外部,但本案不以此為限。In one embodiment, the processor 130 reads a plurality of computer-readable instructions to execute the notification algorithm. The notification algorithm is used to transmit at least one of construction completion information and establishment system permission information. For example, the notification algorithm can transmit the construction completion information to the unit that needs to apply for the virtual robot (for example, the foreign exchange unit of Songshan Branch). The notification algorithm can also transmit the system permission information to the unit that needs to apply for additional permissions (for example, the foreign exchange unit of Songshan Branch). : Abroad), for example, the first virtual robot only has administrative business authority, but is called to do foreign exchange-related business. However, the first virtual robot does not have the authority to perform foreign exchange business, so the notification algorithm can assist the first virtual robot to perform foreign exchange business. Information required to open foreign exchange business authority is transmitted to foreign parties, but this case is not limited to this.

在一實施例中,金融伺服器900包含銀行伺服器、保險伺服器、貸款伺服器及房地產伺服器的其中至少一者。舉例而言,金融伺服器900可以為銀行伺服器、保險伺服器、貸款伺服器或房地產伺服器,但本案不以此為限。In one embodiment, the financial server 900 includes at least one of a bank server, an insurance server, a loan server, and a real estate server. For example, the financial server 900 can be a bank server, insurance server, loan server or real estate server, but this case is not limited to this.

在一實施例中,第一帳號密碼資訊包含權限設定資訊、申請權限資訊、變更權限資訊、密碼更新資訊的其中至少一者。舉例而言,第一帳號密碼資訊可以具有基本的帳號與密碼,也可以從第一帳號密碼資訊中獲得權限設定資訊、申請權限資訊、變更權限資訊或密碼更新資訊,但本案不以此為限。此外,權限設定資訊可以與內部網站、人事資訊相關,申請權限資訊可以與人資單位申請人資之虛擬行員擁有人事系統之特定權限相關,但本案不以此為限。In one embodiment, the first account password information includes at least one of permission setting information, application permission information, change permission information, and password update information. For example, the first account password information can have a basic account and password, and permission setting information, application permission information, permission change information or password update information can also be obtained from the first account password information, but this case is not limited to this. . In addition, the permission setting information can be related to internal websites and personnel information, and the application permission information can be related to the specific permissions of the human resources unit's virtual clerk applying for resources in the personnel system, but this case is not limited to this.

在一實施例中,第一帳號密碼資訊包含暗碼資訊。舉例而言,第一虛擬機器人獲取的密碼無法以明碼呈現,而是以暗碼呈現,例如,帳號為Robot01,密碼為*******,但本案不以此為限。In one embodiment, the first account password information includes password information. For example, the password obtained by the first virtual robot cannot be presented in clear code, but in password. For example, the account number is Robot01 and the password is *****, but this case is not limited to this.

在一實施例中,處理器130用以讀取複數個電腦可讀取指令以執行第二虛擬機器人。然後,處理器130根據第二虛擬機器人以藉由帳號密碼生成器110生成第二帳號密碼資訊並儲存於加密記憶體120。再來,第二虛擬機器人於加密記憶體120獲取並根據第二帳號密碼資訊以連線至金融伺服器900。舉例而言,第二虛擬機器人的操作與第一虛擬機器人的操作相似,為簡潔起見,此處將省略關於第二虛擬機器人其他操作的描述。In one embodiment, the processor 130 is used to read a plurality of computer-readable instructions to execute the second virtual robot. Then, the processor 130 uses the account password generator 110 to generate the second account password information according to the second virtual robot and stores it in the encrypted memory 120 . Next, the second virtual robot obtains from the encrypted memory 120 and connects to the financial server 900 based on the second account password information. For example, the operation of the second virtual robot is similar to the operation of the first virtual robot. For the sake of simplicity, description of other operations of the second virtual robot will be omitted here.

在一實施例中,第一虛擬機器人用以處理第一事務項目,且第二虛擬機器人用以處理第一事務項目。舉例而言,第一事務項目可以為行政事物或與金融相關的事物,例如,某銀行目前有5萬筆客戶的清單待建檔,若僅交由第一虛擬機器人處理,會消耗許多時間,此時可以呼叫閒置中的第二虛擬機器人,讓第二虛擬機器人一同幫忙處理5萬筆客戶的清單建檔,但本案不以此為限。In one embodiment, the first virtual robot is used to process the first transaction item, and the second virtual robot is used to process the first transaction item. For example, the first transaction item can be an administrative matter or something related to finance. For example, a bank currently has 50,000 customer lists to be filed. If it is only processed by the first virtual robot, it will consume a lot of time. At this time, you can call the second virtual robot that is idle and let the second virtual robot help process the list creation of 50,000 customers, but this case is not limited to this.

在一實施例中,第一虛擬機器人用以處理第一事務項目,且第二虛擬機器人用以處理第二事務項目。舉例而言,可以透過第一虛擬機器人及第二虛擬機器人以執行不同流程的金融業務,例如,第一虛擬機器人可以進行收款業務(或存款業務),第二虛擬機器人可以進行放款業務,但本案不以此為限。此外,此時第一虛擬機器人的第一帳號密碼資訊可以綁定用於收款業務(或存款業務),第二虛擬機器人的第二帳號密碼資訊可以綁定用於放款業務,但本案不以此為限。In one embodiment, the first virtual robot is used to process the first transaction item, and the second virtual robot is used to process the second transaction item. For example, the first virtual robot and the second virtual robot can be used to perform different processes of financial business. For example, the first virtual robot can perform collection business (or deposit business), and the second virtual robot can perform lending business, but This case is not limited to this. In addition, at this time, the first account and password information of the first virtual robot can be bound for collection business (or deposit business), and the second account and password information of the second virtual robot can be bound for lending business. However, this case does not use This is the limit.

在一些實施例中,處理器130用以讀取複數個電腦可讀取指令以執行複數個虛擬機器人。舉例而言,當要呼叫虛擬機器人處理業務時,可以呼叫閒置的虛擬機器人(例如:第三虛擬機器人),且此閒置的虛擬機器人可以至加密記憶體120中獲取與上述業務相關的帳號密碼(例如:松山分行的帳號密碼),以順利登入待辦業務的伺服器,但本案不以此為限。此外,松山分行的帳號密碼可以綁定松山分行的伺服器,且松山分行的帳號密碼可以為松山分行所申請的帳號密碼,但本案不以此為限。In some embodiments, the processor 130 is used to read a plurality of computer-readable instructions to execute a plurality of virtual robots. For example, when a virtual robot is called to handle a business, an idle virtual robot (for example, a third virtual robot) can be called, and the idle virtual robot can obtain the account password related to the above-mentioned business from the encrypted memory 120 ( For example: the account password of Songshan Branch) to successfully log in to the server of the pending business, but this case is not limited to this. In addition, the account and password of Songshan Branch can be bound to the server of Songshan Branch, and the account and password of Songshan Branch can be the account and password applied for by Songshan Branch, but this case is not limited to this.

第2圖係依照本案一實施例繪示一種自動化建構方法的步驟流程圖。為使自動化建構方法200易於理解,請一併參閱第1圖及第2圖,且第2圖之自動化建構方法200包含以下步驟:Figure 2 is a step flow chart illustrating an automated construction method according to an embodiment of the present case. To make the automated construction method 200 easy to understand, please refer to Figure 1 and Figure 2 together, and the automated construction method 200 in Figure 2 includes the following steps:

步驟210:根據第一虛擬機器人以藉由帳號密碼生成器110生成第一帳號密碼資訊並儲存於加密記憶體120;Step 210: Generate the first account password information through the account password generator 110 according to the first virtual robot and store it in the encrypted memory 120;

步驟220:第一虛擬機器人於加密記憶體120獲取並根據第一帳號密碼資訊以連線至金融伺服器900。Step 220: The first virtual robot obtains the first account password information from the encrypted memory 120 and connects to the financial server 900.

在一實施例中,請參閱步驟210,處理器130根據第一虛擬機器人以藉由帳號密碼生成器110生成第一帳號密碼資訊並儲存於加密記憶體120。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, please refer to step 210 , the processor 130 generates the first account password information through the account password generator 110 according to the first virtual robot and stores it in the encrypted memory 120 . For example, the operations of the automated construction method 200 in Figure 2 are similar to the automated construction system 100 in Figure 1 . For the sake of simplicity, description of other operations of the automated construction method 200 will be omitted here.

在一實施例中,請參閱步驟220,第一虛擬機器人於加密記憶體120獲取並根據第一帳號密碼資訊以連線至金融伺服器900。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, please refer to step 220. The first virtual robot obtains and connects to the financial server 900 based on the first account password information from the encrypted memory 120. For example, the operations of the automated construction method 200 in Figure 2 are similar to the automated construction system 100 in Figure 1 . For the sake of simplicity, description of other operations of the automated construction method 200 will be omitted here.

在一實施例中,自動化建構方法200更包含以下步驟:根據第一虛擬機器人及時間週期以藉由帳號密碼生成器110生成第二帳號密碼資訊並儲存於加密記憶體120。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, the automated construction method 200 further includes the following steps: using the account password generator 110 to generate second account password information according to the first virtual robot and the time period and storing it in the encrypted memory 120 . For example, the operations of the automated construction method 200 in Figure 2 are similar to the automated construction system 100 in Figure 1 . For the sake of simplicity, description of other operations of the automated construction method 200 will be omitted here.

在一實施例中,自動化建構方法200更包含以下步驟:處理器130讀取複數個電腦可讀取指令以執行綁定演算法,且綁定演算法用以綁定需求單位、流程及設備的其中至少一者。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, the automated construction method 200 further includes the following steps: the processor 130 reads a plurality of computer-readable instructions to execute a binding algorithm, and the binding algorithm is used to bind demand units, processes, and equipment. At least one of them. For example, the operations of the automated construction method 200 in Figure 2 are similar to the automated construction system 100 in Figure 1 . For the sake of simplicity, description of other operations of the automated construction method 200 will be omitted here.

在一實施例中,自動化建構方法200更包含以下步驟:處理器130讀取複數個電腦可讀取指令以執行通知演算法,且通知演算法用以傳遞建構完成資訊及建立系統權限資訊的其中至少一者。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, the automated construction method 200 further includes the following steps: the processor 130 reads a plurality of computer-readable instructions to execute a notification algorithm, and the notification algorithm is used to transmit the construction completion information and the establishment system permission information. At least one. For example, the operations of the automated construction method 200 in Figure 2 are similar to the automated construction system 100 in Figure 1 . For the sake of simplicity, description of other operations of the automated construction method 200 will be omitted here.

在一實施例中,自動化建構方法200中的金融伺服器包含銀行伺服器、保險伺服器、貸款伺服器及房地產伺服器的其中至少一者。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的元件與操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他元件或操作的描述。In one embodiment, the financial server in the automated construction method 200 includes at least one of a bank server, an insurance server, a loan server, and a real estate server. For example, the components and operations of the automated construction method 200 in Figure 2 are similar to the automated construction system 100 in Figure 1 . For the sake of simplicity, descriptions of other components or operations of the automated construction method 200 will be omitted here.

在一實施例中,自動化建構方法200中的第一帳號密碼資訊包含權限設定資訊、申請權限資訊、變更權限資訊、密碼更新資訊的其中至少一者。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的元件與操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他元件或操作的描述。In one embodiment, the first account password information in the automated construction method 200 includes at least one of permission setting information, application permission information, change permission information, and password update information. For example, the components and operations of the automated construction method 200 in Figure 2 are similar to the automated construction system 100 in Figure 1 . For the sake of simplicity, descriptions of other components or operations of the automated construction method 200 will be omitted here.

在一實施例中,第一帳號密碼資訊包含暗碼資訊。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的元件與操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他元件或操作的描述。In one embodiment, the first account password information includes password information. For example, the components and operations of the automated construction method 200 in Figure 2 are similar to the automated construction system 100 in Figure 1 . For the sake of simplicity, descriptions of other components or operations of the automated construction method 200 will be omitted here.

在一實施例中,自動化建構方法200更包含以下步驟:處理器130用以讀取複數個電腦可讀取指令以執行第二虛擬機器人;處理器130根據第二虛擬機器人以藉由帳號密碼生成器110生成第二帳號密碼資訊並儲存於加密記憶體120;以及第二虛擬機器人於加密記憶體120獲取並根據第二帳號密碼資訊以連線至金融伺服器900。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, the automated construction method 200 further includes the following steps: the processor 130 is used to read a plurality of computer-readable instructions to execute the second virtual robot; the processor 130 generates a second virtual robot based on the account and password. The server 110 generates the second account password information and stores it in the encrypted memory 120; and the second virtual robot obtains the second account password information from the encrypted memory 120 and connects to the financial server 900 based on the second account password information. For example, the operations of the automated construction method 200 in Figure 2 are similar to the automated construction system 100 in Figure 1 . For the sake of simplicity, description of other operations of the automated construction method 200 will be omitted here.

在一實施例中,自動化建構方法200更包含以下步驟:第一虛擬機器人用以處理第一事務項目;以及第二虛擬機器人用以處理第一事務項目。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, the automated construction method 200 further includes the following steps: a first virtual robot is used to process the first transaction item; and a second virtual robot is used to process the first transaction item. For example, the operations of the automated construction method 200 in Figure 2 are similar to the automated construction system 100 in Figure 1 . For the sake of simplicity, description of other operations of the automated construction method 200 will be omitted here.

在一實施例中,自動化建構方法200更包含以下步驟:第一虛擬機器人用以處理第一事務項目;以及第二虛擬機器人用以處理第二事務項目。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, the automated construction method 200 further includes the following steps: a first virtual robot is used to process the first transaction item; and a second virtual robot is used to process the second transaction item. For example, the operations of the automated construction method 200 in Figure 2 are similar to the automated construction system 100 in Figure 1 . For the sake of simplicity, description of other operations of the automated construction method 200 will be omitted here.

由上述本案實施方式可知,應用本案具有下列優點。本案實施例所示之自動化建構系統及自動化建構方法得以讓虛擬機器人擁有綁定的帳號密碼與相應的權限,以達到虛擬機器人能與職員皆能登入系統的效果。It can be seen from the above embodiments that the application of this case has the following advantages. The automated construction system and automated construction method shown in the embodiment of this case allow the virtual robot to have a bound account password and corresponding permissions, so as to achieve the effect that both the virtual robot and the staff can log in to the system.

再者,本案可以擁有複數個虛擬機器人,並透過綁定演算法將複數個虛擬機器人綁定於需求單位、流程或設備,並可以根據不同的業務(或任務)需求綁定一個或複數個虛擬機器人,以達到資安管控的效果。同樣的,本案虛擬機器人使用的帳號密碼可以根據不同的業務(或任務)需求而提供不同的權限,以有效地管控虛擬機器人所擁有的權限,進一步達到資安管控的效果。Furthermore, this project can have multiple virtual robots, and bind multiple virtual robots to demand units, processes or equipment through binding algorithms, and can bind one or multiple virtual robots according to different business (or task) requirements. Robots to achieve the effect of information security control. Similarly, the account and password used by the virtual robot in this case can provide different permissions according to different business (or task) needs to effectively control the permissions possessed by the virtual robot and further achieve the effect of information security control.

此外,本案可以應用於金融領域,複數個虛擬機器人有助於金融業務中的安全性,且複數個虛擬機器人有各自綁定的帳號密碼,或因應業務不同所綁定的帳號密碼,其相應的權限同樣被管控,讓虛擬機器人擁有與職員相同的權限,讓虛擬機器人與職員得以於同一時間皆登入系統(或伺服器)內執行業務,增加效率與便利性。In addition, this case can be applied to the financial field. Multiple virtual robots contribute to the security of financial services, and multiple virtual robots have their own account and password bound, or account and password bound to different businesses, and their corresponding Permissions are also controlled, allowing virtual robots to have the same permissions as employees, allowing virtual robots and employees to log in to the system (or server) at the same time to perform business, increasing efficiency and convenience.

雖然上文實施方式中揭露了本案的具體實施例,然其並非用以限定本案,本案所屬技術領域中具有通常知識者,在不悖離本案之原理與精神的情形下,當可對其進行各種更動與修飾,因此本案之保護範圍當以附隨申請專利範圍所界定者為準。Although the above implementation mode discloses specific examples of the present case, it is not intended to limit the present case. Persons with ordinary knowledge in the technical field to which the present case belongs can, without departing from the principles and spirit of the present case, proceed with it. Various changes and modifications, therefore the scope of protection in this case shall be subject to the scope of the accompanying patent application.

100:自動化建構系統 110:帳號密碼生成器 120:加密記憶體 130:處理器 900:金融伺服器 200:自動化建構方法 210、220:步驟 100:Automated construction system 110:Account and password generator 120: Encrypted memory 130: Processor 900: Financial server 200:Automated construction method 210, 220: steps

為讓本案之上述和其他目的、特徵、優點與實施例能更明顯易懂,所附圖式之說明如下: 第1圖係依照本案一實施例繪示一種自動化建構系統的方塊示意圖。 第2圖係依照本案一實施例繪示一種自動化建構方法的步驟流程圖。 根據慣常的作業方式,圖中各種特徵與元件並未依比例繪製,其繪製方式是為了以最佳的方式呈現與本案相關的具體特徵與元件。此外,在不同圖式間,以相同或相似的元件符號來指稱相似的元件/部件。 In order to make the above and other purposes, features, advantages and embodiments of this case more obvious and understandable, the attached drawings are described as follows: Figure 1 is a block diagram illustrating an automated construction system according to an embodiment of the present invention. Figure 2 is a step flow chart illustrating an automated construction method according to an embodiment of the present case. In accordance with common practice, the various features and components in the drawings are not drawn to scale, but are drawn in such a way as to best present the specific features and components relevant to this case. In addition, the same or similar reference symbols are used to refer to similar elements/components in different drawings.

國內寄存資訊(請依寄存機構、日期、號碼順序註記) 無 國外寄存資訊(請依寄存國家、機構、日期、號碼順序註記) 無 Domestic storage information (please note in order of storage institution, date and number) without Overseas storage information (please note in order of storage country, institution, date, and number) without

100:自動化建構系統 100:Automated construction system

110:帳號密碼生成器 110:Account and password generator

120:加密記憶體 120: Encrypted memory

130:處理器 130: Processor

900:金融伺服器 900: Financial server

Claims (10)

一種自動化建構系統,包含:一帳號密碼生成器;一加密記憶體,耦接於該帳號密碼生成器,並用以儲存複數個電腦可讀取指令;以及一處理器,耦接於該加密記憶體,並用以讀取該些電腦可讀取指令以執行一第一虛擬機器人,其中該處理器根據該第一虛擬機器人以藉由該帳號密碼生成器生成一第一帳號密碼資訊並儲存於該加密記憶體,其中該第一虛擬機器人於該加密記憶體獲取該第一帳號密碼資訊,其中該第一虛擬機器人將該第一帳號密碼資訊輸入並連線至一金融伺服器,其中若要從外部應用程式檢視該第一帳號密碼資訊,需要通過該加密記憶體的資安檢查,其中該處理器更將該第一虛擬機器人與該第一帳號密碼資訊綁定,其中根據該綁定,該第一帳號密碼資訊為該第一虛擬機器人專用。 An automated construction system includes: an account password generator; an encrypted memory coupled to the account password generator and used to store a plurality of computer-readable instructions; and a processor coupled to the encrypted memory , and used to read the computer readable instructions to execute a first virtual robot, wherein the processor generates a first account password information through the account password generator according to the first virtual robot and stores it in the encrypted Memory, wherein the first virtual robot obtains the first account password information from the encrypted memory, wherein the first virtual robot inputs the first account password information and connects it to a financial server, wherein if you want to access the first account password from the outside To view the first account and password information, the application needs to pass the security check of the encrypted memory. The processor further binds the first virtual robot to the first account and password information. According to the binding, the third One account password information is exclusive to the first virtual robot. 如請求項1所述之自動化建構系統,其中該處理器根據該第一虛擬機器人及一時間週期以藉由該帳號密碼生成器生成一第二帳號密碼資訊並儲存於該加密記憶體。 The automated construction system of claim 1, wherein the processor generates a second account password information through the account password generator according to the first virtual robot and a time period and stores it in the encrypted memory. 如請求項1所述之自動化建構系統,其中該處理器讀取該些電腦可讀取指令以執行一綁定演算法,其 中該綁定演算法用以綁定一需求單位、一流程及一設備的其中至少一者。 The automated construction system of claim 1, wherein the processor reads the computer readable instructions to execute a binding algorithm, wherein The binding algorithm is used to bind at least one of a demand unit, a process and a device. 如請求項1所述之自動化建構系統,其中該處理器讀取該些電腦可讀取指令以執行一通知演算法,其中該通知演算法用以傳遞一建構完成資訊及一建立系統權限資訊的其中至少一者。 The automated construction system of claim 1, wherein the processor reads the computer-readable instructions to execute a notification algorithm, wherein the notification algorithm is used to deliver a build completion information and a build system permission information. At least one of them. 如請求項1所述之自動化建構系統,其中該金融伺服器包含一銀行伺服器、一保險伺服器、一貸款伺服器及一房地產伺服器的其中至少一者。 The automated construction system of claim 1, wherein the financial server includes at least one of a bank server, an insurance server, a loan server and a real estate server. 如請求項1所述之自動化建構系統,其中該第一帳號密碼資訊包含一權限設定資訊、一申請權限資訊、一變更權限資訊及一密碼更新資訊,以從第一帳號密碼資訊中獲得該權限設定資訊、該申請權限資訊、該變更權限資訊或該密碼更新資訊,該權限設定資訊與內部網站、人事資訊相關,該申請權限資訊與人資單位申請人資之該第一虛擬機器人擁有人事系統之特定權限相關。 The automated construction system as described in request item 1, wherein the first account password information includes a permission setting information, an application permission information, a change permission information and a password update information, so as to obtain the permission from the first account password information. The setting information, the application authority information, the change authority information or the password update information, the authority setting information is related to the internal website and personnel information, the application authority information is related to the human resources unit applicant information and the first virtual robot owns the personnel system related to specific permissions. 如請求項1所述之自動化建構系統,其中該第一帳號密碼資訊包含一暗碼資訊,以使該第一虛擬機器人所獲取的該第一帳號密碼資訊中的密碼無法以明碼呈現,而是以暗碼呈現。 The automated construction system as described in claim 1, wherein the first account and password information includes a password information, so that the password in the first account and password information obtained by the first virtual robot cannot be displayed in clear code, but in The password appears. 如請求項1所述之自動化建構系統,其中該處理器用以讀取該些電腦可讀取指令以執行一第二虛擬機器人,其中該處理器根據該第二虛擬機器人以藉由該帳號密碼生成器生成一第二帳號密碼資訊並儲存於該加密記憶體,其中該第二虛擬機器人於該加密記憶體獲取並根據該第二帳號密碼資訊以連線至該金融伺服器。 The automated construction system of claim 1, wherein the processor is used to read the computer-readable instructions to execute a second virtual robot, wherein the processor generates data based on the second virtual robot using the account password. The server generates a second account password information and stores it in the encrypted memory, wherein the second virtual robot obtains and connects to the financial server based on the second account password information in the encrypted memory. 如請求項8所述之自動化建構系統,其中該第一虛擬機器人用以處理一第一事務項目,其中該第二虛擬機器人用以處理該第一事務項目。 The automated construction system of claim 8, wherein the first virtual robot is used to process a first transaction item, and the second virtual robot is used to process the first transaction item. 如請求項8所述之自動化建構系統,其中該第一虛擬機器人用以處理一第一事務項目,其中該第二虛擬機器人用以處理一第二事務項目。 The automated construction system of claim 8, wherein the first virtual robot is used to process a first transaction item, and the second virtual robot is used to process a second transaction item.
TW111133013A 2022-08-31 2022-08-31 Automated construction system TWI827229B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW111133013A TWI827229B (en) 2022-08-31 2022-08-31 Automated construction system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW111133013A TWI827229B (en) 2022-08-31 2022-08-31 Automated construction system

Publications (2)

Publication Number Publication Date
TWI827229B true TWI827229B (en) 2023-12-21
TW202411868A TW202411868A (en) 2024-03-16

Family

ID=90053362

Family Applications (1)

Application Number Title Priority Date Filing Date
TW111133013A TWI827229B (en) 2022-08-31 2022-08-31 Automated construction system

Country Status (1)

Country Link
TW (1) TWI827229B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580478A (en) * 2015-01-15 2015-04-29 环旭电子股份有限公司 Internet-of-Things device off-line sharing access right control method
US20190130094A1 (en) * 2017-10-26 2019-05-02 Bank Of America Corporation Authentication protocol elevation triggering system
CN114143029A (en) * 2021-10-29 2022-03-04 航天信息股份有限公司 User personal account password generating system and method capable of being repeatedly generated
CN114723405A (en) * 2022-04-12 2022-07-08 浪潮软件股份有限公司 Cross-domain communication method and system based on RPA mechanism
TWM636099U (en) * 2022-08-31 2023-01-01 合作金庫商業銀行股份有限公司 Automated construction system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580478A (en) * 2015-01-15 2015-04-29 环旭电子股份有限公司 Internet-of-Things device off-line sharing access right control method
US20190130094A1 (en) * 2017-10-26 2019-05-02 Bank Of America Corporation Authentication protocol elevation triggering system
CN114143029A (en) * 2021-10-29 2022-03-04 航天信息股份有限公司 User personal account password generating system and method capable of being repeatedly generated
CN114723405A (en) * 2022-04-12 2022-07-08 浪潮软件股份有限公司 Cross-domain communication method and system based on RPA mechanism
TWM636099U (en) * 2022-08-31 2023-01-01 合作金庫商業銀行股份有限公司 Automated construction system

Also Published As

Publication number Publication date
TW202411868A (en) 2024-03-16

Similar Documents

Publication Publication Date Title
Wang et al. Blockchain-based data privacy management with nudge theory in open banking
US20240121247A1 (en) Systems and methods for managing digital identities
US20210326420A1 (en) Identity use server
JP2021512416A (en) Systems, methods, and devices that enable intelligent consensus, smart consensus, and weighted consensus models for distributed ledger technology in a cloud-based computing environment.
Ali et al. A transparent and trusted property registration system on permissioned blockchain
Kassab et al. Investigating quality requirements for blockchain-based healthcare systems
US10810550B1 (en) System for process coordination and interoperability across different systems, platforms, and/or businesses
Kumari et al. Design of a secure and smart healthcare IoT with blockchain: a review
Khatter et al. Non-functional requirements for blockchain enabled medical supply chain
Ma et al. Nudging data privacy management of open banking based on blockchain
Ujjan et al. The impact of Blockchain technology on advanced security measures for E-Government
Dubey et al. Smart Education based on Blockchain Technology
TWI827229B (en) Automated construction system
TWM636099U (en) Automated construction system
CN112419060B (en) Asset hosting system, asset management method, node and medium
Toapanta et al. Blockchain analysis applied to a process for the national public data system for Ecuador
CN116340985A (en) Ledger system of multi-layer digital wallet based on blockchain
Başer et al. What if we could travel without passport? First sight to blockchain-based identity management in tourism
Jain et al. EHR: Patient Electronic Health Records using Blockchain Security Framework
Edrees et al. An Overview of Blockchain Technology in Government Sectors Use Cases, Benefits and Challenges
Matwyshyn Corporate Cyborgs and Technology Risks
Chytis A review of blockchain technology and its applications in the business environment
SELLA VELUSWAMI et al. Blockchain based system for transfer of funds through an e-Governance application.
Gupta et al. 5 Emergence of Big
Manu et al. Blockchain-based health care applications