Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

426results about How to "Control access" patented technology

Method and system architecture for realizing service interconnection between multiple video monitoring platforms

The invention relates to a method for achieving service intercommunication between various video monitoring platforms, and system architecture. The method comprises the following steps: a signal interface and a media gateway are added to every video monitoring platform to convert a private signal and video stream transport protocol within the video monitoring platform into a standard signal and video stream transport protocol; an independent gateway custody and management platform and a public client end unit connected with the gateway custody and management platform are added for unified management of signal interaction and the input and output of the video stream between various video monitoring platforms, and for management, authentication, and charging of the intercommunication service, and for the storage of related data of the intercommunication service; and based on a user mapping mode, unified management of the user mapping mode is carried out by the gateway custody and management platform, so as to provide the intercommunication service of the video monitor platform for different kinds of video monitoring platform clients and public clients. The method realizes service intercommunication for the video monitoring platforms.
Owner:CHINA TELECOM CORP LTD

Calculable creditworthiness-based access control method under distributed environment of multiple trusting domains

The invention relates to a calculable creditworthiness-based access control method under the distributed environment of multiple trusting domains in the technical field of network. The method comprises the following steps of: logging in a target trusting domain by a user, and giving the trusting domain a role set of the user by role mapping and role changing; trying acquiring resource informationin the target domain by the user; inquiring a delegated strategy database; updating user behavior variable values in an accumulation behavior library, and updating the times of executing user behaviors corresponding to outland roles in a behavior evaluating library; changing the role on the basis of the behavior; generating behavior evaluation vectors, and calculating a fame value of the role; and regulating a role mapping strategy related to the role. The method realizes dynamic trust management of role mapping, role changing and fame feedback, improves interaction capacity between the trusting domains and the user, improves flexibility, security and reliability of access control in the trusting domains, and effectively solves the problems of user authorization and resource management inservice of network systems by taking the user behavior as trusted evaluation objects.
Owner:SHANGHAI JIAO TONG UNIV

Virtual machine system and safety control method thereof

The invention discloses a virtual machine system which comprises a management virtual machine, a virtual machine monitor, a client virtual machine and a safety virtual machine. The management virtual machine is used for authenticating the client virtual machine and sending an authenticated result to the virtual machine monitor. The virtual machine monitor is used for transmitting an access request sent from the client virtual machine to the management virtual machine. The authenticated result sent from the management virtual machine is transmitted to the client virtual machine. The authenticated result sent from the client virtual machine is transmitted to the safety virtual machine. According to access permission, physical resources are accessed and an access result is returned to the client virtual machine. The client virtual machine is used for sending the access request and the authenticated result to the virtual machine monitor. The safety virtual machine is used for issuing the access permission of the client virtual machine to the virtual machine monitor. The invention further discloses a safety control method of the virtual machine system. With the system and the method, workload of the virtual machine monitor can be lowered, the access permission of the client virtual machine can be flexibly controlled, and the access of the client virtual machine to the physical resources is effectively controlled.
Owner:ZTE CORP

Networking control method, device and system, security gateway and mobile terminal

The embodiment of the present invention discloses a networking control method, device and system, a security gateway and a mobile terminal, wherein the method comprises the steps of using the security gateway to determine whether to allow a network connection request to pass according to a preset rule aiming at the network connection request sent by an application program on the mobile terminal; if not, blocking the network connection request; if yes, passing the network connection request; acquiring the information of the application programs consuming the network flow in the mobile terminal; querying whether the information of the application programs consuming the network flow is recorded in a pre-generated configuration list, wherein the application programs operated at the foreground at different time are recorded in the configuration list; if the information of the application programs consuming the network flow is not recorded in the pre-generated configuration list, generating and sending out a prompting message whether to forbid the application programs consuming the network flow to connect a network, and when the prompting message of forbidding the application programs consuming the network flow to connect the network is received, cutting the network connection of the corresponding application program. According to the embodiment of the present invention, the differentiated management of the flow generated by the application programs can be realized.
Owner:BEIJING QIHOO TECH CO LTD

Access control system and access control method of fine-grained privacy security

ActiveCN104683362AGuarantee data securityMeet fine-grained privacy protection requirementsTransmissionUser privacyMedia access control
The invention discloses an access control system and an access control method of the fine-grained privacy security. The access control system of the social networking service fine-grained privacy security comprises a strategy management module, a social networking service group control module, a request processing module, an access control module, an optimizing module and an execution module. The strategy management module is used for maintaining and combining access control strategies; the social networking service group control module is used for maintaining all attribute sets; the request processing module is used for verifying identification; the access control module is used for carrying out the decision for the access request to obtain a decision result; the optimizing module is used for carrying out the exclusiveness processing on the decision result; the execution module is used for executing the decision result. The access control system is used for controlling the security of data flow in the social networking service, a more fine-grained access control mechanism is provided for a user, the user privacy can be protected, and the application requirement of the social networking service can be met.
Owner:HEFEI UNIV OF TECH

Formation method and lithium-ion secondary battery

ActiveCN106785148AImprove comprehensive electrochemical performanceImprove formation qualitySecondary cells charging/dischargingLithium electrodeEngineering
The invention provides a formation method and a lithium-ion secondary battery, and relates to the technical field of lithium-ion batteries. The invention provides a formation method. The lithium-ion battery is formed through four formation stages which are sequentially carried out. The formation current of the four formation stages is gradually increased, and negative pressure extracted for four times is also linearly increased. According to the formation method, the formation quality of an SEI film can be effectively improved and the bulging rate of the lithium-ion battery is reduced, so that the comprehensive electrochemical properties of the lithium-ion battery are improved. According to the lithium-ion secondary battery, an electrolyte of the lithium-ion secondary battery is a non-aqueous system and formation treatment is carried out by using the formation method. The lithium-ion secondary battery does not easily bulge in the using process and has good comprehensive electrochemical properties.
Owner:深圳一特科技有限公司

Fuzzy keyword search method oriented to multi-server and multi-user

The invention discloses a fuzzy keyword search method oriented to multi-servers and multi-users. The method comprises the steps: a data owner encrypts a clear-text set into a cipher-text set, extractsa keyword set, generates an index of a clear-text document set based on a MinHash and stores the cipher-text set and the encrypted index in a cloud server S; the cloud server S distributes the cipher-text set and the re-encrypted index to cloud servers S1, S2, ..., SN; an authorized user generates the keyword needing to be searched into a keyword fingerprint based on the Minhash to obtain a keyword trap door; and the cloud server S performs a Jaccard similarity comparison on the keyword trap door and the index and performs sorting, outputs a cipher-text document to the authorized user. According to the fuzzy keyword search method oriented to the multi-servers and the multi-users, through the use of a dimensionality reduction concept of the MinHash, fuzzy keyword search is realized; retrieval files are sorted by use of a Jaccard distance; and multi-user inquiry is realized by use of re-encryption and the efficiency of the fuzzy keyword search can be effectively improved.
Owner:BEIJING UNIV OF TECH

An identity control method based on credibility platform module and fingerprint identifying

The invention provides an identity control method based on TPM and fingerprint identification that includes steps: A1, presetting the fingerprint characteristic information module, the module is protected by the TPM; A2, the fingerprint collecting module collects the image information of present user's fingerprint, and the information is transmitted to the fingerprint extracting module; A3, the fingerprint extracting module extracts and calculates the characteristic of fingerprint, and the results is sent to the TMP chip; A4, The fingerprint comparison module of the TMP chip compares with the fingerprint characteristic data extracted this time according to the fingerprint characteristic module to identify the user's identity; A5, the TPM chip judges that the user has the authority to operate the computer according to the comparing result and to execute the step A6, otherwise execute the step A7; A6, the TPM chip works normally and executes the operation of user's requirement; A7, the TPM chip is in inactive state and rejects the operation of user's requirement, and return the error information for upper layer.
Owner:SHENZHEN SINOSUN TECH

Method and system for controlling access rights

ActiveCN103581187AControl accessAvoid the problem of not being able to restrict superusersTransmissionData miningControl system
The invention discloses a method and system for controlling access rights. The method includes the steps of firstly, extracting a name tag of an access party which requests to conduct access operation on an access object, wherein name tags and right tags corresponding to the name tags are preset in the access object; secondly, determining whether the access party passes validation or not according to the preset name tags and the extracted name tag, and determining that the access party passes the validation if the extracted name tag is consistent with one of the preset name tags; thirdly, determining whether the access party has the access right to conduct access operation on the access object or not according to the right tag corresponding to the extracted name tag. According to the method and system for controlling the access rights, the access rights of all users are effectively controlled, the problem that an existing related technology can not limit super users is solved, and safety and reliability of the system are improved.
Owner:DAWNING CLOUD COMPUTING TECH CO LTD

A method for implementing forced door

The invention provides a forced portal realizing method, including the steps: a user builds a connection with a web server to be accessed through wideband access server (BAS); then, the user sends HTTP or HTTPS request message; the BAS receives the message and then configures web page containing forced portal information and sends the web page to the user; the user receives the web page and then automatically connect to forced portal website. The invention can make BAS easily realize forced portal and can appoint concrete web page of forced portal and can carry parameters to web server, flexibly setting if it displays parameters in address column and can make BAS flexibly control the mode of user accessing web page by HTML and network programming technique.
Owner:HUAWEI TECH CO LTD

File usage authority management method, device and system

The invention belongs to the field of computers and provides a file usage authority management method. The file usage authority management comprises the following steps that a request of a user for uploading a file is received, the uploaded file is stored, and the file service information of the uploaded file is recorded in a file information data list; an authority setting order is received, and according to the file service information in the file information data list and the authority setting order, the authorities of the user to access and process the stored files in a data base server are set; according to information of a user account and the set user authorities, the authorities of the user to access and process the stored files in the data base server are controlled. According to the file usage authority management method, files are managed in a classified mode, the authorities of different users to access and process the stored files are set, the usage authorities of the users on the files are controlled, uniform management of the file authorities is achieved according to file levels and user levels, and the file security management efficiency is improved.
Owner:NINGBO JIANGDONG HENGGUAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products