Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

659results about How to "Flexible management" patented technology

Method and systems for controlling access to computing resources based on known security vulnerabilities

Methods and systems are provided for fine tuning access control by remote, endpoint systems to host systems. Multiple conditions / states of one or both of the endpoint and host systems are monitored, collected and fed to an analysis engine. Using one or more of many different flexible, adaptable models and algorithms, an analysis engine analyzes the status of the conditions and makes decisions in accordance with pre-established policies and rules regarding the security of the endpoint and host system. Based upon the conditions, the policies, and the analytical results, actions are initiated regarding security and access matters. In one described embodiment of the invention, the monitored conditions include software vulnerabilities.
Owner:DAEDALUS BLUE LLC

Methods and systems for intelligently controlling access to computing resources

Methods and systems are provided for fine tuning access control by remote, endpoint systems to host systems. Multiple conditions / states of one or both of the endpoint and host systems are monitored, collected and fed to an analysis engine. Using one or more of many different flexible, adaptable models and algorithms, an analysis engine analyzes the status of the conditions and makes decisions in accordance with pre-established policies and rules regarding the security of the endpoint and host system. Based upon the conditions, the policies, and the analytical results, actions are initiated regarding security and access matters. In one described embodiment of the invention, the monitored conditions include software vulnerabilities.
Owner:DAEDALUS BLUE LLC

Radiofrequency identification (RFID) based intelligent logistics managing system

InactiveCN103593751AEfficient informatizationFlexible managementLogisticsEmbedded systemStorage garage
The invention relates to an RFID based intelligent logistics managing system, which belongs to the field of logistics management, and used for managing logistics information of cargoes with RFID tags. The logistics managing system comprises a logistics control system, a storage system arranged in a warehouse and a vehicle-mounted mobile module, wherein the logistics control system is connected with the storage system and the vehicle-mounted mobile module via a communication network to realize commutation between the logistics control system and the storage system or the vehicle-mounted mobile module, each of the storage system and the vehicle-mounted storage system is equipped with an RFID reader, the RFID readers read information of the RFID tags, and the RFID information is transmitted to the logistics control system. According to the RFID based intelligent logistics managing system, logistics information can be managed in a highly-efficient, automatic, informationized, networked, intelligent and flexible manner.
Owner:CHINA CONSTR EIGHT ENG DIV CORP LTD

Network flux classification processing method and apparatus

The present invention discloses a network flow assorting and processing method which comprises the steps as follows: building a service tree that is corresponding with the service assorted structure; allocating the parameters that matches with flow making either node of the service tree relating to the flow attribution of corresponding service; allocating the executing strategy, wherein any executing strategy comprises a plurality of strategy rules and each strategy rule defines a processing action of a service node; as for the received net flow, executing the matching that matches with the flow matching parameters and invoking corresponding executing strategy to process according to matching result and the structure of the service tree. The present invention also discloses a net flow assorted processing device. The present invention can reduce the allocating workload of managing the net flow and increase the transplant performance of the net flow management. Besides, the net flow management can be more efficiency and flexible.
Owner:NEW H3C TECH CO LTD

Data permission management method, data permission management system and service management system

The invention discloses a data permission management method, a data permission management system and a service management system and relates to the field of computer technologies. The method disclosed by the invention comprises the steps that the data permission management system receives a user's data access request intercepted by the service system; through analysis of the data access request, an object to be accessed by the user is acquired; access permission information of the object to be accessed by the user is searched in permission configuration information; and the access permission information is integrated with the data access request, and then the integrated information and request are returned to the service system, so that the service system can continue processing the data access request with the access permission information. According to the invention, uniform and centralized management of data permissions of each service system can be implemented by the data permission management system; and management and maintenance become convenient.
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1

Method for accessing and uploading data in data storage system

The invention provides a method for accessing and uploading data in a data storage system. The method of accessing data comprises the following steps: a client side initiates an access request message for access to a file; an authentication server determines the security level of the file according to feature information of the file in the access request message after receiving the access request message; if the security level of the file requires to carry out a smart key equipment certification process, the authentication server informs the client side of utilizing smart key equipment to carry out the smart key equipment certification process; after receiving information for the smart key equipment authentication, the client side carries out the smart key equipment authentication process; if the authentication server approves the smart key equipment authentication, the authentication server sends a notification message to a storage server; the storage server allows the client side to access to the file; the client side acquires the file, and decrypts the data of the file by utilizing a decryption key in the smart key equipment, so as to obtain the decrypted data.
Owner:TENDYRON CORP

SDN (Software Defined Network) platform based on router virtualization and implementation method

ActiveCN105681191ARealize traffic interworkingGood data plane performanceData switching networksSoftware simulation/interpretation/emulationData virtualizationSoftware
The invention discloses an SDN (Software Defined Network) platform based on router virtualization and an implementation method, and relates to the field of virtualization technology, SDNs and cloud computation. The SDN platform comprises a virtual router, an Openflow switch and an SDN controller, wherein the SDN controller comprises an eastbound-westbound interface, a northbound interface, a first southbound interface and a second southbound interface; the second southbound interface is used for controlling data packet forwarding of the virtual router, and recording flow entry information of the virtual router; the first southbound interface is used for learning routing topology and a flow table of the second southbound interface in order to control rapid forwarding of the Openflow switch; and an application programming interface (API) layer based on an Openflow protocol is encapsulated on an integrated code layer of the virtual router. Through adoption of the SDN platform based on the router virtualization and the implementation method, high data forwarding performance and routing performance between an SDN network and a conventional network can be realized. The virtual router has the characteristics of high functional extensibility and high flexibility, and can be applied to the cloud computation easily.
Owner:FENGHUO COMM SCI & TECH CO LTD

Method for constructing problem difficulty level based on big data as well as device and service equipment

The embodiments of the invention relate to the technical field of computers, and disclose a method for constructing a problem difficulty level based on big data as well as a device and service equipment. The method comprises the following steps: collecting answer data for multiple student users to answer a certain target exercise; judging a grade identifier indicating the grade of each student in the multiple student users is same as that in attribute information of the target exercise or not; and when the grade identifier indicating the grade of each student in the multiple student users is same as that in the attribute information of the target exercise, calculating the answering accuracy of the target exercise on the basis of the answer data for the multiple student users to answer the target exercise; and determining the problem difficulty level of the target exercise on the basis of the calculated answering accuracy, and updating the determined problem difficulty level into the attribution information of the target exercise. By implementing the embodiments of the invention, the problem difficulty level of an exercise can be objectively defined, and dynamic and flexible management of the defined problem difficulty level can be achieved.
Owner:GUANGDONG XIAOTIANCAI TECH CO LTD

Method and device for identifying access control identity based on ultrasonic waves

The invention provides a method and a device for identifying access control identity based on ultrasonic waves. The method comprises the following steps of enabling each user to install an access control APP (application) at a hand-held mobile terminal, and use the ID (identity) to register as the user of the access control APP; generating an encrypting key and a decrypting key; enabling an access control machine to obtain the information of the users, and storing into a local database; when the distance between the hand-held mobile terminal and the access control machine is controlled within the setting range, using an encrypting algorithm and the encrypting key to encrypt the ID to obtain encrypting information, converting the encrypting information into a data frame, converting the data frame into an ultrasonic signal by an ultrasonic digital encoding type, transiting the ultrasonic signal via a loudspeaker, enabling the access control machine to receive the ultrasonic signal and convert the ultrasonic signal into the data frame, demodulating, and decrypting to obtain a plain text; if the plain text is matched with the information of the local database, automatically opening a door. The method and the device for identifying the access control identify based on the ultrasonic waves have the beneficial effects that the safety is higher, the use cost is reduced, and the reliability is higher.
Owner:SHENZHEN YUDI TECH CO LTD

Log information management method and system

The method divides log information management system into log request process module and log information process module. Log detection process of the method includes (1) the log request process module constructs and outputs log detection request to the log information process module; (2) after detecting the log detection request, the log information process module detects stored state of log information in log information base, determines whether the detected stored state of log information exceeds prearranged configured threshold of log stored state; if yes, deleting log information with attribute being as unimportant in log information base; otherwise, ending current process. The invention realizes detection of log information, deletes unimportant log information automatically.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products