TWI827229B - Automated construction system - Google Patents
Automated construction system Download PDFInfo
- Publication number
- TWI827229B TWI827229B TW111133013A TW111133013A TWI827229B TW I827229 B TWI827229 B TW I827229B TW 111133013 A TW111133013 A TW 111133013A TW 111133013 A TW111133013 A TW 111133013A TW I827229 B TWI827229 B TW I827229B
- Authority
- TW
- Taiwan
- Prior art keywords
- information
- virtual robot
- account
- password
- automated construction
- Prior art date
Links
- 238000010276 construction Methods 0.000 title claims abstract description 74
- 238000000034 method Methods 0.000 claims description 23
- 230000008569 process Effects 0.000 claims description 22
- 230000008859 change Effects 0.000 claims description 5
- 230000000694 effects Effects 0.000 description 6
- 238000004801 process automation Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000012954 risk control Methods 0.000 description 1
Images
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Manipulator (AREA)
- Automatic Assembly (AREA)
Abstract
Description
本案係有關於一種建構系統,且特別是關於一種自動化建構系統。This case relates to a construction system, and in particular to an automated construction system.
現行,RPA流程自動化技術(Robot Process Automation, RPA)可取代人為操作電腦畫面執行重複步驟,但透過RPA登入各應用系統取用資料仍須具備該系統之帳號密碼權限。若提供RPA使用職員自身之帳號密碼,而職員自身之帳號密碼可能同時擁有其他額外權限,造成資料外流的風險擴大。Currently, RPA process automation technology (Robot Process Automation, RPA) can replace the manual operation of computer screens to perform repetitive steps. However, logging into each application system through RPA to access data still requires the account and password authority of the system. If RPA is provided to use the employee's own account and password, the employee's own account and password may also have other additional permissions, which will increase the risk of data leakage.
此外,職員自身之帳號密碼需要定期更新,以維護資安。若同時將職員自身之帳號密碼提供給RPA使用,易造成RPA使用到舊的帳號密碼,造成無法登入。In addition, employees’ own account passwords need to be updated regularly to maintain information security. If the employee's own account and password are provided to RPA at the same time, it is easy for RPA to use the old account and password, making it impossible to log in.
再者,若登入之系統本身不支援同一時間使用同一組帳號密碼登入,則RPA尚需與職員錯開使用系統的時間,造成使用上相當不便。Furthermore, if the system you are logging into does not support logging in using the same account and password at the same time, the RPA will still need to stagger the time when employees use the system, causing considerable inconvenience in use.
發明內容旨在提供本揭示內容的簡化摘要,以使閱讀者對本揭示內容具備基本的理解。此發明內容並非本揭示內容的完整概述,且其用意並非在指出本案實施例的重要/關鍵元件或界定本案的範圍。This summary is intended to provide a simplified summary of the disclosure to provide the reader with a basic understanding of the disclosure. This summary is not an extensive overview of the disclosure, and it is not intended to identify key/critical elements of the embodiments or to delineate the scope of the disclosure.
本案內容之一技術態樣係關於一種自動化建構系統。自動化建構系統包含帳號密碼生成器、加密記憶體及處理器。加密記憶體耦接於帳號密碼生成器,並用以儲存複數個電腦可讀取指令。處理器耦接於加密記憶體,並用以讀取複數個電腦可讀取指令以執行第一虛擬機器人。處理器根據第一虛擬機器人以藉由帳號密碼生成器生成第一帳號密碼資訊並儲存於加密記憶體。第一虛擬機器人於加密記憶體獲取並根據第一帳號密碼資訊以連線至金融伺服器。One of the technical aspects of this case relates to an automated construction system. The automated construction system includes an account and password generator, encrypted memory and processor. The encrypted memory is coupled to the account password generator and used to store a plurality of computer-readable instructions. The processor is coupled to the encrypted memory and used to read a plurality of computer readable instructions to execute the first virtual robot. The processor generates the first account password information through the account password generator according to the first virtual robot and stores it in the encrypted memory. The first virtual robot obtains from the encrypted memory and connects to the financial server based on the first account password information.
因此,根據本案之技術內容,本案實施例所示之自動化建構系統得以讓虛擬機器人擁有綁定的帳號密碼與相應的權限,以達到虛擬機器人能與職員皆能登入系統的效果。Therefore, according to the technical content of this case, the automated construction system shown in the embodiment of this case allows the virtual robot to have a bound account password and corresponding permissions, so as to achieve the effect that both the virtual robot and employees can log in to the system.
在參閱下文實施方式後,本案所屬技術領域中具有通常知識者當可輕易瞭解本案之基本精神及其他發明目的,以及本案所採用之技術手段與實施態樣。After referring to the following embodiments, those with ordinary knowledge in the technical field to which this case belongs can easily understand the basic spirit and other purposes of the invention, as well as the technical means and implementation styles adopted in this case.
為了使本揭示內容的敘述更加詳盡與完備,下文針對了本案的實施態樣與具體實施例提出了說明性的描述;但這並非實施或運用本案具體實施例的唯一形式。實施方式中涵蓋了多個具體實施例的特徵以及用以建構與操作這些具體實施例的方法步驟與其順序。然而,亦可利用其他具體實施例來達成相同或均等的功能與步驟順序。In order to make the description of this disclosure more detailed and complete, the following provides an illustrative description of the implementation aspects and specific embodiments of this case; but this is not the only form of implementing or using the specific embodiments of this case. The embodiments cover features of multiple specific embodiments as well as method steps and their sequences for constructing and operating these specific embodiments. However, other specific embodiments may also be used to achieve the same or equivalent functions and step sequences.
除非本說明書另有定義,此處所用的科學與技術詞彙之含義與本案所屬技術領域中具有通常知識者所理解與慣用的意義相同。此外,在不和上下文衝突的情形下,本說明書所用的單數名詞涵蓋該名詞的複數型;而所用的複數名詞時亦涵蓋該名詞的單數型。Unless otherwise defined in this specification, the scientific and technical terms used herein have the same meanings as commonly understood and customary by a person with ordinary knowledge in the technical field to which the subject matter belongs. In addition, unless there is conflict with the context, the singular noun used in this specification covers the plural form of the noun; and the plural noun used also covers the singular form of the noun.
另外,關於本文中所使用之「耦接」或「連接」,可指二或多個元件相互直接作實體或電性接觸,或是相互間接作實體或電性接觸,亦可指二或多個元件相互操作或動作。In addition, as used herein, "coupling" or "connection" may refer to two or more components that are in direct physical or electrical contact with each other, or that are in indirect physical or electrical contact with each other, or it may also refer to two or more components that are in direct physical or electrical contact with each other. components interact or act with each other.
在本文中,用語『電路』泛指由一或多個電晶體與/或一或多個主被動元件按一定方式連接以處理訊號的物件。In this article, the term "circuit" generally refers to an object that is connected in a certain manner by one or more transistors and/or one or more active and passive components to process signals.
在說明書及申請專利範圍中使用了某些詞彙來指稱特定的元件。然而,所屬技術領域中具有通常知識者應可理解,同樣的元件可能會用不同的名詞來稱呼。說明書及申請專利範圍並不以名稱的差異做為區分元件的方式,而是以元件在功能上的差異來做為區分的基準。在說明書及申請專利範圍所提及的「包含」為開放式的用語,故應解釋成「包含但不限定於」。Certain words are used in the specification and patent claims to refer to specific components. However, those with ordinary skill in the art will understand that the same components may be referred to by different names. The specification and the patent application do not use the difference in name as a way to distinguish components, but the difference in function of the components as the basis for distinction. The "include" mentioned in the specification and the scope of the patent application is an open-ended term, so it should be interpreted as "include but not limited to".
第1圖係依照本案一實施例繪示一種自動化建構系統的方塊示意圖。如圖所示,自動化建構系統100包含帳號密碼生成器110、加密記憶體120及處理器130。於連接關係,加密記憶體120耦接於帳號密碼生成器110,處理器130耦接於加密記憶體120。Figure 1 is a block diagram illustrating an automated construction system according to an embodiment of the present invention. As shown in the figure, the
為達到虛擬機器人能與職員皆能登入系統的效果,本案提供如第1圖所示之自動化建構系統100,其相關操作詳細說明如後所述。In order to achieve the effect that both virtual robots and employees can log in to the system, this project provides an
於操作上,在一實施例中,加密記憶體120用以儲存複數個電腦可讀取指令。然後,處理器130用以讀取複數個電腦可讀取指令以執行第一虛擬機器人。舉例而言,第一虛擬機器人可以為機器人流程自動化(Robot Process Automation, RPA)演算法或程式,但本案不以此為限。此外,第一虛擬機器人可以稱為虛擬行員,此虛擬行員可以具有真實職員的身份與相關權限,但本案不以此為限。In operation, in one embodiment, the
在一實施例中,處理器130根據第一虛擬機器人以藉由帳號密碼生成器110生成第一帳號密碼資訊並儲存於加密記憶體120。舉例而言,處理器130可以將第一虛擬機器人與帳號密碼生成器110生成的第一帳號密碼資訊綁定,使此第一帳號密碼資訊為第一虛擬機器人專用,並為了維護資安,處理器130再將此第一帳號密碼資訊儲存於加密記憶體120,若要從外部應用程式檢視此第一帳號密碼資訊,需要通過加密記憶體120的資安檢查,但本案不以此為限。In one embodiment, the
在一實施例中,第一虛擬機器人於加密記憶體120獲取並根據第一帳號密碼資訊以連線至金融伺服器900。舉例而言,上述的第一帳號密碼資訊為第一虛擬機器人專用,故第一虛擬機器人可以直接於加密記憶體120中獲取此第一帳號密碼資訊,且第一虛擬機器人可以將此第一帳號密碼資訊輸入並連線於金融伺服器900,但本案不以此為限。In one embodiment, the first virtual robot obtains and connects to the
在一實施例中,處理器130根據第一虛擬機器人及時間週期以藉由帳號密碼生成器110生成第二帳號密碼資訊並儲存於加密記憶體120。舉例而言,時間週期可以為6個月,當第一虛擬機器人已使用第一帳號密碼資訊有6個月時,處理器130可以再次藉由帳號密碼生成器110生成第一虛擬機器人專用的第二帳號密碼資訊(即新帳號密碼資訊),但本案不以此為限。此外,上述個新帳號密碼資訊可以每6個月被自動更新,但本案不以此為限。In one embodiment, the
在一實施例中,處理器130讀取複數個電腦可讀取指令以執行綁定演算法。綁定演算法用以綁定需求單位、流程及設備的其中至少一者。舉例而言,處理器130可以藉由綁定演算法以將第一虛擬機器人(或10台虛擬機器人)綁定於某一需求單位(例如:松山分行)、某一流程(例如:存款流程)或某一設備(例如:特定的電腦),以達到風險控制的效果。In one embodiment, the
在一實施例中,處理器130讀取複數個電腦可讀取指令以執行通知演算法。通知演算法用以傳遞建構完成資訊及建立系統權限資訊的其中至少一者。舉例而言,通知演算法可以將建構完成資訊傳遞至申請虛擬機器人的需求單位(例如:松山分行的外匯單位),通知演算法也可以將建立系統權限資訊傳遞給需要額外申請權限的單位(例如:國外部),例如,第一虛擬機器人僅擁有行政業務的權限,但被呼叫做外匯相關的業務,然而第一虛擬機器人沒有執行外匯業務的權限,故通知演算法可以協助將第一虛擬機器人需要開通外匯業務權限的資訊傳遞給國外部,但本案不以此為限。In one embodiment, the
在一實施例中,金融伺服器900包含銀行伺服器、保險伺服器、貸款伺服器及房地產伺服器的其中至少一者。舉例而言,金融伺服器900可以為銀行伺服器、保險伺服器、貸款伺服器或房地產伺服器,但本案不以此為限。In one embodiment, the
在一實施例中,第一帳號密碼資訊包含權限設定資訊、申請權限資訊、變更權限資訊、密碼更新資訊的其中至少一者。舉例而言,第一帳號密碼資訊可以具有基本的帳號與密碼,也可以從第一帳號密碼資訊中獲得權限設定資訊、申請權限資訊、變更權限資訊或密碼更新資訊,但本案不以此為限。此外,權限設定資訊可以與內部網站、人事資訊相關,申請權限資訊可以與人資單位申請人資之虛擬行員擁有人事系統之特定權限相關,但本案不以此為限。In one embodiment, the first account password information includes at least one of permission setting information, application permission information, change permission information, and password update information. For example, the first account password information can have a basic account and password, and permission setting information, application permission information, permission change information or password update information can also be obtained from the first account password information, but this case is not limited to this. . In addition, the permission setting information can be related to internal websites and personnel information, and the application permission information can be related to the specific permissions of the human resources unit's virtual clerk applying for resources in the personnel system, but this case is not limited to this.
在一實施例中,第一帳號密碼資訊包含暗碼資訊。舉例而言,第一虛擬機器人獲取的密碼無法以明碼呈現,而是以暗碼呈現,例如,帳號為Robot01,密碼為*******,但本案不以此為限。In one embodiment, the first account password information includes password information. For example, the password obtained by the first virtual robot cannot be presented in clear code, but in password. For example, the account number is Robot01 and the password is *****, but this case is not limited to this.
在一實施例中,處理器130用以讀取複數個電腦可讀取指令以執行第二虛擬機器人。然後,處理器130根據第二虛擬機器人以藉由帳號密碼生成器110生成第二帳號密碼資訊並儲存於加密記憶體120。再來,第二虛擬機器人於加密記憶體120獲取並根據第二帳號密碼資訊以連線至金融伺服器900。舉例而言,第二虛擬機器人的操作與第一虛擬機器人的操作相似,為簡潔起見,此處將省略關於第二虛擬機器人其他操作的描述。In one embodiment, the
在一實施例中,第一虛擬機器人用以處理第一事務項目,且第二虛擬機器人用以處理第一事務項目。舉例而言,第一事務項目可以為行政事物或與金融相關的事物,例如,某銀行目前有5萬筆客戶的清單待建檔,若僅交由第一虛擬機器人處理,會消耗許多時間,此時可以呼叫閒置中的第二虛擬機器人,讓第二虛擬機器人一同幫忙處理5萬筆客戶的清單建檔,但本案不以此為限。In one embodiment, the first virtual robot is used to process the first transaction item, and the second virtual robot is used to process the first transaction item. For example, the first transaction item can be an administrative matter or something related to finance. For example, a bank currently has 50,000 customer lists to be filed. If it is only processed by the first virtual robot, it will consume a lot of time. At this time, you can call the second virtual robot that is idle and let the second virtual robot help process the list creation of 50,000 customers, but this case is not limited to this.
在一實施例中,第一虛擬機器人用以處理第一事務項目,且第二虛擬機器人用以處理第二事務項目。舉例而言,可以透過第一虛擬機器人及第二虛擬機器人以執行不同流程的金融業務,例如,第一虛擬機器人可以進行收款業務(或存款業務),第二虛擬機器人可以進行放款業務,但本案不以此為限。此外,此時第一虛擬機器人的第一帳號密碼資訊可以綁定用於收款業務(或存款業務),第二虛擬機器人的第二帳號密碼資訊可以綁定用於放款業務,但本案不以此為限。In one embodiment, the first virtual robot is used to process the first transaction item, and the second virtual robot is used to process the second transaction item. For example, the first virtual robot and the second virtual robot can be used to perform different processes of financial business. For example, the first virtual robot can perform collection business (or deposit business), and the second virtual robot can perform lending business, but This case is not limited to this. In addition, at this time, the first account and password information of the first virtual robot can be bound for collection business (or deposit business), and the second account and password information of the second virtual robot can be bound for lending business. However, this case does not use This is the limit.
在一些實施例中,處理器130用以讀取複數個電腦可讀取指令以執行複數個虛擬機器人。舉例而言,當要呼叫虛擬機器人處理業務時,可以呼叫閒置的虛擬機器人(例如:第三虛擬機器人),且此閒置的虛擬機器人可以至加密記憶體120中獲取與上述業務相關的帳號密碼(例如:松山分行的帳號密碼),以順利登入待辦業務的伺服器,但本案不以此為限。此外,松山分行的帳號密碼可以綁定松山分行的伺服器,且松山分行的帳號密碼可以為松山分行所申請的帳號密碼,但本案不以此為限。In some embodiments, the
第2圖係依照本案一實施例繪示一種自動化建構方法的步驟流程圖。為使自動化建構方法200易於理解,請一併參閱第1圖及第2圖,且第2圖之自動化建構方法200包含以下步驟:Figure 2 is a step flow chart illustrating an automated construction method according to an embodiment of the present case. To make the automated
步驟210:根據第一虛擬機器人以藉由帳號密碼生成器110生成第一帳號密碼資訊並儲存於加密記憶體120;Step 210: Generate the first account password information through the
步驟220:第一虛擬機器人於加密記憶體120獲取並根據第一帳號密碼資訊以連線至金融伺服器900。Step 220: The first virtual robot obtains the first account password information from the
在一實施例中,請參閱步驟210,處理器130根據第一虛擬機器人以藉由帳號密碼生成器110生成第一帳號密碼資訊並儲存於加密記憶體120。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, please refer to step 210 , the
在一實施例中,請參閱步驟220,第一虛擬機器人於加密記憶體120獲取並根據第一帳號密碼資訊以連線至金融伺服器900。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, please refer to step 220. The first virtual robot obtains and connects to the
在一實施例中,自動化建構方法200更包含以下步驟:根據第一虛擬機器人及時間週期以藉由帳號密碼生成器110生成第二帳號密碼資訊並儲存於加密記憶體120。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, the automated
在一實施例中,自動化建構方法200更包含以下步驟:處理器130讀取複數個電腦可讀取指令以執行綁定演算法,且綁定演算法用以綁定需求單位、流程及設備的其中至少一者。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, the automated
在一實施例中,自動化建構方法200更包含以下步驟:處理器130讀取複數個電腦可讀取指令以執行通知演算法,且通知演算法用以傳遞建構完成資訊及建立系統權限資訊的其中至少一者。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, the automated
在一實施例中,自動化建構方法200中的金融伺服器包含銀行伺服器、保險伺服器、貸款伺服器及房地產伺服器的其中至少一者。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的元件與操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他元件或操作的描述。In one embodiment, the financial server in the automated
在一實施例中,自動化建構方法200中的第一帳號密碼資訊包含權限設定資訊、申請權限資訊、變更權限資訊、密碼更新資訊的其中至少一者。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的元件與操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他元件或操作的描述。In one embodiment, the first account password information in the automated
在一實施例中,第一帳號密碼資訊包含暗碼資訊。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的元件與操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他元件或操作的描述。In one embodiment, the first account password information includes password information. For example, the components and operations of the automated
在一實施例中,自動化建構方法200更包含以下步驟:處理器130用以讀取複數個電腦可讀取指令以執行第二虛擬機器人;處理器130根據第二虛擬機器人以藉由帳號密碼生成器110生成第二帳號密碼資訊並儲存於加密記憶體120;以及第二虛擬機器人於加密記憶體120獲取並根據第二帳號密碼資訊以連線至金融伺服器900。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, the automated
在一實施例中,自動化建構方法200更包含以下步驟:第一虛擬機器人用以處理第一事務項目;以及第二虛擬機器人用以處理第一事務項目。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, the automated
在一實施例中,自動化建構方法200更包含以下步驟:第一虛擬機器人用以處理第一事務項目;以及第二虛擬機器人用以處理第二事務項目。舉例而言,第2圖之自動化建構方法200與第1圖之自動化建構系統100的操作相似,為簡潔起見,此處將省略關於自動化建構方法200其他操作的描述。In one embodiment, the automated
由上述本案實施方式可知,應用本案具有下列優點。本案實施例所示之自動化建構系統及自動化建構方法得以讓虛擬機器人擁有綁定的帳號密碼與相應的權限,以達到虛擬機器人能與職員皆能登入系統的效果。It can be seen from the above embodiments that the application of this case has the following advantages. The automated construction system and automated construction method shown in the embodiment of this case allow the virtual robot to have a bound account password and corresponding permissions, so as to achieve the effect that both the virtual robot and the staff can log in to the system.
再者,本案可以擁有複數個虛擬機器人,並透過綁定演算法將複數個虛擬機器人綁定於需求單位、流程或設備,並可以根據不同的業務(或任務)需求綁定一個或複數個虛擬機器人,以達到資安管控的效果。同樣的,本案虛擬機器人使用的帳號密碼可以根據不同的業務(或任務)需求而提供不同的權限,以有效地管控虛擬機器人所擁有的權限,進一步達到資安管控的效果。Furthermore, this project can have multiple virtual robots, and bind multiple virtual robots to demand units, processes or equipment through binding algorithms, and can bind one or multiple virtual robots according to different business (or task) requirements. Robots to achieve the effect of information security control. Similarly, the account and password used by the virtual robot in this case can provide different permissions according to different business (or task) needs to effectively control the permissions possessed by the virtual robot and further achieve the effect of information security control.
此外,本案可以應用於金融領域,複數個虛擬機器人有助於金融業務中的安全性,且複數個虛擬機器人有各自綁定的帳號密碼,或因應業務不同所綁定的帳號密碼,其相應的權限同樣被管控,讓虛擬機器人擁有與職員相同的權限,讓虛擬機器人與職員得以於同一時間皆登入系統(或伺服器)內執行業務,增加效率與便利性。In addition, this case can be applied to the financial field. Multiple virtual robots contribute to the security of financial services, and multiple virtual robots have their own account and password bound, or account and password bound to different businesses, and their corresponding Permissions are also controlled, allowing virtual robots to have the same permissions as employees, allowing virtual robots and employees to log in to the system (or server) at the same time to perform business, increasing efficiency and convenience.
雖然上文實施方式中揭露了本案的具體實施例,然其並非用以限定本案,本案所屬技術領域中具有通常知識者,在不悖離本案之原理與精神的情形下,當可對其進行各種更動與修飾,因此本案之保護範圍當以附隨申請專利範圍所界定者為準。Although the above implementation mode discloses specific examples of the present case, it is not intended to limit the present case. Persons with ordinary knowledge in the technical field to which the present case belongs can, without departing from the principles and spirit of the present case, proceed with it. Various changes and modifications, therefore the scope of protection in this case shall be subject to the scope of the accompanying patent application.
100:自動化建構系統
110:帳號密碼生成器
120:加密記憶體
130:處理器
900:金融伺服器
200:自動化建構方法
210、220:步驟
100:Automated construction system
110:Account and password generator
120: Encrypted memory
130: Processor
900: Financial server
200:
為讓本案之上述和其他目的、特徵、優點與實施例能更明顯易懂,所附圖式之說明如下: 第1圖係依照本案一實施例繪示一種自動化建構系統的方塊示意圖。 第2圖係依照本案一實施例繪示一種自動化建構方法的步驟流程圖。 根據慣常的作業方式,圖中各種特徵與元件並未依比例繪製,其繪製方式是為了以最佳的方式呈現與本案相關的具體特徵與元件。此外,在不同圖式間,以相同或相似的元件符號來指稱相似的元件/部件。 In order to make the above and other purposes, features, advantages and embodiments of this case more obvious and understandable, the attached drawings are described as follows: Figure 1 is a block diagram illustrating an automated construction system according to an embodiment of the present invention. Figure 2 is a step flow chart illustrating an automated construction method according to an embodiment of the present case. In accordance with common practice, the various features and components in the drawings are not drawn to scale, but are drawn in such a way as to best present the specific features and components relevant to this case. In addition, the same or similar reference symbols are used to refer to similar elements/components in different drawings.
國內寄存資訊(請依寄存機構、日期、號碼順序註記) 無 國外寄存資訊(請依寄存國家、機構、日期、號碼順序註記) 無 Domestic storage information (please note in order of storage institution, date and number) without Overseas storage information (please note in order of storage country, institution, date, and number) without
100:自動化建構系統 100:Automated construction system
110:帳號密碼生成器 110:Account and password generator
120:加密記憶體 120: Encrypted memory
130:處理器 130: Processor
900:金融伺服器 900: Financial server
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW111133013A TWI827229B (en) | 2022-08-31 | 2022-08-31 | Automated construction system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW111133013A TWI827229B (en) | 2022-08-31 | 2022-08-31 | Automated construction system |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI827229B true TWI827229B (en) | 2023-12-21 |
TW202411868A TW202411868A (en) | 2024-03-16 |
Family
ID=90053362
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW111133013A TWI827229B (en) | 2022-08-31 | 2022-08-31 | Automated construction system |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI827229B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580478A (en) * | 2015-01-15 | 2015-04-29 | 环旭电子股份有限公司 | Internet-of-Things device off-line sharing access right control method |
US20190130094A1 (en) * | 2017-10-26 | 2019-05-02 | Bank Of America Corporation | Authentication protocol elevation triggering system |
CN114143029A (en) * | 2021-10-29 | 2022-03-04 | 航天信息股份有限公司 | User personal account password generating system and method capable of being repeatedly generated |
CN114723405A (en) * | 2022-04-12 | 2022-07-08 | 浪潮软件股份有限公司 | Cross-domain communication method and system based on RPA mechanism |
TWM636099U (en) * | 2022-08-31 | 2023-01-01 | 合作金庫商業銀行股份有限公司 | Automated construction system |
-
2022
- 2022-08-31 TW TW111133013A patent/TWI827229B/en active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580478A (en) * | 2015-01-15 | 2015-04-29 | 环旭电子股份有限公司 | Internet-of-Things device off-line sharing access right control method |
US20190130094A1 (en) * | 2017-10-26 | 2019-05-02 | Bank Of America Corporation | Authentication protocol elevation triggering system |
CN114143029A (en) * | 2021-10-29 | 2022-03-04 | 航天信息股份有限公司 | User personal account password generating system and method capable of being repeatedly generated |
CN114723405A (en) * | 2022-04-12 | 2022-07-08 | 浪潮软件股份有限公司 | Cross-domain communication method and system based on RPA mechanism |
TWM636099U (en) * | 2022-08-31 | 2023-01-01 | 合作金庫商業銀行股份有限公司 | Automated construction system |
Also Published As
Publication number | Publication date |
---|---|
TW202411868A (en) | 2024-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Blockchain-based data privacy management with nudge theory in open banking | |
US20240121247A1 (en) | Systems and methods for managing digital identities | |
US20210326420A1 (en) | Identity use server | |
JP2021512416A (en) | Systems, methods, and devices that enable intelligent consensus, smart consensus, and weighted consensus models for distributed ledger technology in a cloud-based computing environment. | |
Ali et al. | A transparent and trusted property registration system on permissioned blockchain | |
Kassab et al. | Investigating quality requirements for blockchain-based healthcare systems | |
US10810550B1 (en) | System for process coordination and interoperability across different systems, platforms, and/or businesses | |
Kumari et al. | Design of a secure and smart healthcare IoT with blockchain: a review | |
Khatter et al. | Non-functional requirements for blockchain enabled medical supply chain | |
Ma et al. | Nudging data privacy management of open banking based on blockchain | |
Ujjan et al. | The impact of Blockchain technology on advanced security measures for E-Government | |
Dubey et al. | Smart Education based on Blockchain Technology | |
TWI827229B (en) | Automated construction system | |
TWM636099U (en) | Automated construction system | |
CN112419060B (en) | Asset hosting system, asset management method, node and medium | |
Toapanta et al. | Blockchain analysis applied to a process for the national public data system for Ecuador | |
CN116340985A (en) | Ledger system of multi-layer digital wallet based on blockchain | |
Başer et al. | What if we could travel without passport? First sight to blockchain-based identity management in tourism | |
Jain et al. | EHR: Patient Electronic Health Records using Blockchain Security Framework | |
Edrees et al. | An Overview of Blockchain Technology in Government Sectors Use Cases, Benefits and Challenges | |
Matwyshyn | Corporate Cyborgs and Technology Risks | |
Chytis | A review of blockchain technology and its applications in the business environment | |
SELLA VELUSWAMI et al. | Blockchain based system for transfer of funds through an e-Governance application. | |
Gupta et al. | 5 Emergence of Big | |
Manu et al. | Blockchain-based health care applications |