Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

45results about How to "Effective access control" patented technology

Permission determination method and device for storage cluster, equipment and storage medium

The invention discloses a permission determination method for a storage cluster, and the method comprises the following steps: obtaining a permission authorization file generated by a service providerbased on a permission request file, the permission authorization file comprising a cluster identifier of an authorized storage cluster and a node identifier of each storage node in the authorized storage cluster; distributing the authority authorization file to each storage node of the target storage cluster; obtaining authentication result information returned by each storage node of the targetstorage cluster, wherein the authentication result information is information that each storage node of the target storage cluster determines whether authentication is passed or not according to a cluster identifier and a node identifier contained in the authority authorization file; and determining whether to provide a service based on the authentication result information. By applying the technical scheme provided by the embodiment of the invention, authority control can be effectively carried out, and authority abuse is avoided. The invention furthermore discloses a storage cluster permission determination device, storage cluster permission determination equipment and a storage medium, which have corresponding technical effects.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

CTC route control method for automatic inter-city railway reentry operation

The invention relates to a CTC route control method for automatic inter-city railway reentry operation. The CTC route control method comprises the steps that firstly train set binding management is performed on a train operation plan line in which reentry operation occurs in a prepared adjustment plan, a hooking relationship is formed and then transmitted to train station equipment, and the station equipment automatically changes the number of a reentry train according to the received hooking relationship in combination with the type of the reentry operation, and automatically triggers the route of the reentry train. Compared with the prior art, the CTC route control method has the advantages of reducing the workload of manual intervention, improving the degree of automation of the systemand the like.
Owner:CASCO SIGNAL

Privacy protection system and method used for P2P social network and based on broadcast encryption

The invention relates to a privacy protection system and method used for a P2P social network and based on broadcast encryption. The system comprises a key agreement module, a symmetrical encryption communication module and an encryption and decryption module for broadcast encryption. The key agreement module is used for conducting key agreement when instant chats are established between users in the current P2P social network and other users. The symmetrical encryption communication module is used for encrypting and decrypting broadcast encryption private keys when the users in the current P2P social network add friends and encrypting and decrypting sent instant chat information in the instant chat process. The encryption and decryption module for broadcast encryption is used for selecting the users receiving the state when the users in the current P2P social network issue the state and broadcasting the encrypted issued state, and the users receiving the state receive the information through decryption. On the basis of the P2P social network, effective access control over the social network is achieved, the information transmission amount in the social network is reduced, and the safety of user information is enhanced.
Owner:NORTHEASTERN UNIV

Method, device and system for generating facial effect resource, and readable storage medium

Embodiments of the invention provide a method, a device and a system for generating a facial effect resource, and a readable storage medium. The method comprises the following steps of: establishing aresource type of the facial effect resource by a user terminal in response to an establishment instruction of the resource type; establishing a trigger download activity item corresponding to the resource type in response to the establishment instruction of the trigger download activity item; uploading the corresponding facial effect resource to the corresponding folder in the server in responseto an upload instruction of the facial effect resource; returning a corresponding URL field to the user terminal according to the uploaded facial effect resource by the server; and, by the user terminal, generating a static resource file based on the URL field, the resource type and the trigger download activity item, and sending the static resource file to the server. Therefore, the traffic access can be effectively controlled during the peak traffic period, and the facial effect resources can be provided in a static manner, which can reduce the access traffic of the server and effectively provide the facial special effects resources used by the mobile terminal.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

Safety accessing system and safety accessing method for character terminal RLOGIN protocol

The invention belongs to the technical field of computer network security, and discloses a safety accessing system and a safety accessing method for a character terminal RLOGIN protocol. The safety accessing system for the character terminal RLOGIN protocol comprises an SSH (secure shell) agency service terminal and a character login access control service terminal, wherein the SSH agency service terminal is used for SSH connection from client sides to login an internal network, verifying identifications and selecting equipment requiring to be accessed, and the character login access control service terminal is used for connecting an RLOGIN protocol to a selected UNIX / LINUX server, converting data between encrypted data and unencrypted data, simultaneously monitoring keywords of an instruction, and performing instruction blocking as required. On the basis of not changing existing network environment and operation habits as far as possible, the safety accessing system and the safety accessing method for the character terminal RLOGIN protocol guarantees safety of access links, and can effectively manage network equipment and servers requiring to be accessed.
Owner:DATCENT TECH

Interconnection information safety protective system of electric automobile

InactiveCN107247907AImplement access controlRealize transparent encryption and decryptionDigital data protectionTransmissionConfidentialityFile system
The invention discloses an interconnection information safety protective system of an electric automobile. The system comprises a network protection module and a document system protection module, wherein the network protection module is used to filter a network package, manage and control networking actions and record detailed information of network actions; the document system protection module comprises a document monitoring module, a storage equipment control module and a virtual magnetic disk control module; the document monitoring module is used to monitor document operations, record operation information of a document and control document reading and writing according to an access permission of the document; the storage equipment control module is used to control reading and writing of storage equipment; and the virtual magnetic disk control module is used to establish a virtual magnetic disk, load / unload the virtual magnetic disk and control reading and writing of the virtual magnetic disk. According to the invention, an information safety protective system is achieved to monitor and protect an electric automobile information platform effectively; confidentiality and integrity of computer data can be maintained better; and a better and reliable protection service can be provided for personal information.
Owner:NARI TECH CO LTD +3

Method and device for establishing access relationship, electronic equipment and storage medium

The invention discloses an access relationship establishment method and device, electronic equipment and a storage medium. The method comprises the following steps: acquiring an access request message, wherein the access request message carries identity information and a message feature value; determining identity identification information and a host type corresponding to the access request message according to the identity information and the message feature value; determining an identity recognition result according to the identity information and the identity recognition information; and establishing an access relationship according to the identity recognition result and the host type. According to the technical scheme, the identity information and the message feature value in the access request message are confirmed, and whether the access relation is established or not is determined based on the identity recognition information and the host type, so that operations such as identity counterfeiting, malicious permission utilization and unauthorized access can be effectively avoided, and normative, legal, effective and safe access control is realized.
Owner:海恒数字科技(青岛)有限公司 +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products