Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

94results about How to "Implement permission control" patented technology

Method, device and system for controlling intelligent household equipment

The invention relates to a method, device and system for controlling intelligent household equipment, and belongs to the field of controlling of the intelligent household equipment. The method includes the steps of receiving a request for obtaining a right sent from a terminal in a local area network, inquiring right setting information stored locally to obtain right information of the terminal and sending the right information to the terminal, wherein the right information is used for the terminal to control the intelligent household equipment in the local area network. The device comprises a receiving module, an inquiry module and a sending module. The system comprises a router and the terminal. By means of the method, device and system for controlling the intelligent household equipment, right control over the intelligent household equipment is achieved, and controlling intelligentization of the intelligent household equipment is greatly improved.
Owner:XIAOMI INC

Cheating prevention electronic weighing apparatus calibrating system and method

The invention relates to cheating prevention electronic weighing apparatus calibrating system and method. The calibrating system comprises an electronic weighing apparatus, an electronic weighing apparatus calibrating device and a metering supervisory management platform, wherein the metering supervisory management platform comprises an electronic weighing apparatus, a calibrating device, databases comprising various identity information and operating information of a calibrating staff and a computer or a server for carrying the databases, and establishes direct or indirect data communication link by a network and the calibrating device. The system is provided with a card swiping unit and an authenticating unit, a calibrating mode of the traditional electronic weighing apparatus can be changed, the calibrating operation is transmitted to the calibrating device to be carried out so as to ensure the electronic weighing apparatus can not independently finish the calibrating program, which enhances the safety and reliability of calibration and effectively prevents illegal calibration, thereby effectively preventing a behavior for cheating on the electronic weighing apparatus by the illegal calibration on the electronic weighing apparatus.
Owner:CHENGDU JIUZHOU ELECTRONIC INFORMATION SYSTEM CO LTD

Method and system of Web for accessing Docker container

The invention discloses a method and a system of a Web for accessing a Docker container, and belongs to the technical field of cloud computing. The technical problems needing to be solved are that an independent SSH service for remote login and access still needs to be built for the Web to access the Docker container remotely, configuration of parameters such as a user name and a password is needed, and the remote access process is tedious. By adoption of the technical scheme, the method comprises the steps of finding a to-be-accessed Docker container at a Web page and initiating an access request by a user; judging user authority by an access support assembly; if the user has the authority, building a token for Docker container access and returning the token to the user; by the access support assembly, obtaining the ID of the Docker container and the IP address of a host machine where the Docker container is, and generating an URL address of the Docker container interface; verifying the token by a Web access assembly, and building Websocket connection through the URL address of the Docker container interface if the token passes the verification; and opening the Web page containing a console terminal of the Docker container through the Web access assembly. The method and the system of the Web for accessing the Docker container can still realize authority control on Docker container access without enabling an sshd course.
Owner:SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD

Home network multimedia content sharing access control method and device

Disclosed is an access control method for sharing multimedia content in a home network. The method comprises the following steps: receiving an access request sent by a client device; judging whether the client device has access permission, and if the client device has the access permission, displaying to the client device a catalogue and content that corresponds to the permission, and permitting the client device to access the catalogue and content. Also disclosed is an access control device for sharing multimedia content in a home network. The present invention effectively solves the permission control problem when a DLNA device conducts sharing, including the authentication of the device access permission, and the access permission control of whether the public and non-public catalogues / contents of shared content is visible to different users.
Owner:ZTE CORP

Account system setting method and system, computer device and storage medium

The invention relates to the field of account management, in particular to an account system setting method and system, a computer device and a storage medium. The method comprises: setting up a distributed fabric network structure, invoking the password original cryptogen utility, generating the certificate and key, generating a primary user after the super administrator certificate is bound to the first user, wherein the primary user has the new service permission, the query service permission and the permission to create the secondary user; calling the root certificate to issue the user certificate, and binding the user certificate with the user to generate the secondary user, wherein the secondary user has the new service permission and the query service permission. The Fabric networkstructure of the invention provides policy services such as identity service, access control, authorization management and the like for the block chain network, wherein the secondary users can be registered and registered by the primary users, which ensures the relevance between the users. The secondary users can further refine the functions to avoid the excessive exposure of the primary users, realize the control of the account authority, and ensure the security of the account.
Owner:PING AN TECH (SHENZHEN) CO LTD

Multi-user remote parallel computation system

ActiveCN102646223ASolve the conflict problem of concurrent operationImplement permission controlResourcesTransmissionWeb servicePower system scheduling
The invention belongs to the field of power systems, and particularly relates to a multi-user remote parallel computation system. The multi-user remote parallel computation system comprises a WEB server, an application server, a database server, a parallel computer group and network connection switching equipment, wherein the WEB server, the application server, the database server and the parallel computer group are respectively connected with the network connection switching equipment. According to the technical scheme provided by the invention, the design scheme that the software system adopts 'concentrated storage, data sharing, remote maintenance, cooperation and component integration' as the predominant idea while meeting the requirements of 'practicability, modularization, integrity and expandability' is determined, and the requirements of the mode calculation of the power system on functions and performances of a computer software system and the need for relatively flexible updating and maintenance of the system are comprehensively considered. According to the multi-user remote parallel computation system provided by the utility model, the reliability and the mode calculation working efficiency of power grid data are comprehensively improved.
Owner:CHINA ELECTRIC POWER RES INST +1

System and method for realizing data authority control based on metadata in big data environment

The invention relates to a system for realizing data authority control based on metadata in a big data environment. The system comprises: a metadata management module used for acquiring metadata information in the big data environment from different databases through a built-in adapter; a authority configuration module which is used for configuring authority marks of metadata for different roles;and an authority service module which is used for generating an authority service interface according to the stored authority information and providing authority authentication service to the outside.The invention further relates to a method for realizing metadata-based data permission control in the big data environment. The system and the method for realizing data authority control based on metadata in the big data environment are adopted; the problem of data permission control of different types of databases is solved, meanwhile, a large amount of encoding time for data acquisition is saved, the complexity of data permission control is reduced, the problems that cross-system data permission control cannot be performed and the permission control process cannot be effectively monitored at present are solved, and unified control of data permission is realized.
Owner:PRIMETON INFORMATION TECH

A system and method for realizing page refinement authority control

The invention discloses a system and a method for realizing page refinement authority control. The system includes a receiving module, Web page authority judging module, a page element authority judgment module and a page display module, the receiving module receives an access request of a user to a web page. The page authority judging module judges whether the user authority matches the page authority, and the page element authority judging module circularly requests the page element of the page, and judges whether the user authority matches the page element authority, and determines the display or hiding of the corresponding page element, and the page display module displays the corresponding page element according to the matching result. On the basis of presetting page element authorization attributes and user authorization information, By implementing Struts 2 user-defined tag, the display and hiding of page elements are realized according to the return result of user-defined tag,and the permissions of elements in the page are controlled, which achieves the purpose of fine control of page element permissions and reduces the maintenance cost.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD

Short message reading method and apparatus

The invention discloses a short message reading method and apparatus and belongs to the field of information security. The short message reading method comprises the following steps of receiving a short message reading request by a third party application program, detecting whether reading time for reading the request is within a short message forbidding visit period when the short message carries sensitive information, and making no respond to the reading request when the reading time belongs to the forbidding visit period. A problem can be solved that malignant application program acquires a permission for executing sensitive operations via reading verification codes in the short message when a third party application program can read short message content in a short message assembly when only owning a short message reading permission from the perspective of operation system. By the use of the method, the third party application program cannot read short message content in the forbidding visit period in light of short message carrying sensitive information, so sensitive information in the short message can be prevented from being leaked in the forbidding visiting period; and single short message granularity permission can be controlled.
Owner:XIAOMI INC

An authority unified management platform applied to an intelligent factory

The invention discloses an authority unified management platform applied to an intelligent factory. The system comprises an authority management system, and the authority management system comprises an authority management server, an authority database installed in the authority management server through software, an authority system, an authority controller which is connected with managed equipment and can run online or offline, and authority recognition equipment which is used in cooperation with the authority controller to achieve authority recognition. The authority management server is incommunication connection with each authority controller; wherein the authority management server is communicated with managed equipment, and the managed equipment is in communication connection withthe authority card reader. According to the invention, authority management and distribution are performed on the managed equipment through the unified authority management system, and the authority management server controls login of the equipment according to the read authority information, so that unified authority management of equipment login is realized.
Owner:AUTOMOTIVE ENG CORP +1

Multi-level role permission control method and device based on cryptography

The invention provides a multi-level role permission control method and device based on cryptography, electronic equipment and a storable medium. The method comprises the following steps: dividing a role superior-subordinate relationship according to a service permission demand; controlling the access permission in the spatial dimension through the key encryption and decryption permission; whereina part of roles have verification permission, single original text information needing to be verified is sent to a verification party by a verified party (data input party) or a management party (highest permission party), the verification party performs hash operation on the original text information to obtain a hash head, the hash head is compared with the hash head of the encrypted informationobtained by the verification party, and if the two hash heads are consistent, the verification content is not tampered. The method is suitable for various access permission and verification permission requirements in the space dimension and the time dimension, extremely complex service requirements in real life can also be flexibly realized through simple configuration, and the development cost and the maintenance cost of a permission system are greatly reduced. Based on the cryptography technology, the permission is determined through the secret key, and high safety and stability are achieved.
Owner:杭州城市大数据运营有限公司 +2

Medical data management system based on double block chains and patient authorized medical record sharing method

PendingCN113764060ADefend against attackAvoid the risk of medical disputesDatabase distribution/replicationDigital data protectionMedical emergencyIn patient
The invention discloses a medical data management system based on double block chains and a patient authorized medical record sharing method, and relates to the technical field of authenticated key negotiation algorithms. The medical data management system comprises a medical block chain, a supervision block chain, a medical record storage end, a medical record access control endfor sending medical record access authorization to a medical record request end and calling an intelligent contract to store health records containing medical record keywords, and a medical record request end which is used for acquiring active authorization and requesting data from the medical record storage end when the patient is awake and calling the intelligent contract to search the health record matched with the fingerprint of the patient when the patient is coma so as to request data from the medical record storage end. According to the system and the method, a graded workload proof consensus mechanism is adopted, the speed of generating the new block is changed according to the emergency degree of the transaction, a double-chain structure is used for supervising the data on the chain, and privately mining attacks are effectively resisted.
Owner:ANHUI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products