Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

34results about How to "Precise access control" patented technology

Terminal admission control method based on switch port management

The invention relates to the technical field of terminal admission control, and particularly discloses a terminal admission control method based on switch port management. The method includes the steps that after a new terminal gets access to a network, the new terminal is collected through a switch, the unique identification of the terminal is extracted, and the terminal is interrelated with a port of the switch; the unique identification is compared with MAC addresses of an admission database and judged; if the unique identification is inquired, the new terminal is a legal terminal, and no action is generated; if the unique identification is not inquired, the new terminal is an illegal terminal or an external terminal, the corresponding port of the switch is closed immediately, and close information is recorded in the admission database; when a new terminal gets access to the network again, the new terminal is joined after window period processing; the previous steps are executed again to start processing; if no new terminal gets access to the network, the closed port of the switch is automatically opened after appointed time. MAC address management is adopted for the terminals, a terminal user is forbidden to change an MAC address without authorization, a virtual machine is managed, HUB access is stopped, and terminal admission control is accurate and strict.
Owner:尹志超

Internet of ships intelligent shore-based interaction device based on Beidou

The invention discloses an Internet of ships intelligent shore-based interaction device based on Beidou, and the device comprises an embedded-type main control board, an extended control board, a communication/positioning module, an AIS module, a ZigBee module, a sensor module, an RFID module, an internal control module, an encryption module, a power module, an external control module, a fingerprint recognition module, a DVR module, a multimedia module, a storage unit, an intelligent terminal system, a liquid crystal touch screen, and an interface module. The embedded-type main control board is connected with the extended control board. The power module is connected with the main control board and the extended control board. The communication/positioning module achieves interaction with shore-based equipment through a Beidou message or a 3G/GPRS signal. The device employs the technology of multimode positioning, the technology of sensing, the technology of wireless networking communication and the technology of safety encryption, achieves a function of inland river gate report, a function of visualized emergency command scheduling and a function of shipping electronic business, and prompts the building and development of inland river Internet of ships.
Owner:林兴志

Automatic construction system and method for access control strategy of high-level information system

ActiveCN111818059APrecise access controlImplementation of Security PolicyTransmissionInformation resourceInformation system
The invention discloses an automatic construction system and method for an access control strategy of a high-level information system. According to the scheme, information resource acquisition is carried out on software and hardware products in a whole network system based on an information resource acquisition module, an access control mechanism hierarchical division module, a subject-object andrelationship carding module, a high-level demand gradual essence module, an automatic strategy generation module and an information resource acquisition module; the access control mechanism hierarchical division module performs hierarchical division on an access control mechanism; the subject-object and relationship carding module caries a subject, an object and a relationship structure thereof byanalyzing the subject, the object and the relationship structure thereof in the whole network system; the high-level demand gradual essence module is used for gradually refining the essence service access demand and the operation and maintenance management access demand; and the automatic strategy generation module generates an access control strategy of each access control mechanism level. According to the scheme, in the resource access process of a network system user, accurate access control can be carried out on the user no matter what level access is carried out.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY

Database access control method and system and related equipment

The embodiment of the invention provides a database access control method, a database access control system and related equipment, which are used for reducing the granularity of database access control and improving the security of data access. The method of the embodiment of the invention comprises: receiving a database operation request, and parsing operation information and authentication information in the database operation request, wherein the operation information at least comprises an operation object table; verifying whether the authentication information is valid or not, and if the authentication information is valid, judging whether the operation object table exists in a preset white list or not; and if the operation object table exists in a preset authorization white list, executing a corresponding operation in the database operation request, and if the operation object table does not exist in the preset authorization white list, not allowing the corresponding operation inthe database operation request.
Owner:金蝶蝶金云计算有限公司

Dynamic access control method based on business body

The invention provides a dynamic access control method based on a business body, which relates to the technical field of system access control, and comprises the following steps: abstracting a business system to obtain an initial business body BEInit; a user sends an access request to a service system, a user attribute acquisition method in an initial service body BEInit acquires user attributes, a complete service body is obtained, and a trust evaluation method in the service body evaluates a user trust level according to the user attributes; a trust judgment mechanism in the service body judges a user trust level and a service system security level attribute value of the service body; and if the user trust level is higher than the service system security level attribute value of the service body, allowing the user to continue to access. According to the method, access control is carried out based on the business body by introducing a business body concept, and flexible, rapid and safe access control authorization is realized in an open and complex super application system environment.
Owner:LINYI UNIVERSITY

A system and method for automatically constructing access control policies for high-level information systems

The invention discloses a system and a method for automatically constructing an access control strategy of a high-level information system. The scheme is based on an information resource collection module, an access control mechanism hierarchical division module, a subject-object and relationship sorting module, a high-level demand step-by-step essence module, and an automatic strategy The generation module, the information resource collection module collects information resources for the software and hardware products in the entire network system; the access control mechanism hierarchical division module divides the access control mechanism hierarchically; the subject object and its relationship sorting module analyzes the entire network system, Sort out the subject, object and their relationship structure; the high-level requirements are gradually refined by the essence module, the essence of business access requirements and operation and maintenance management access requirements; the policy automatic generation module generates access control policies for each access control mechanism level. This solution enables network system users to perform accurate access control on users no matter what level they access from in the process of accessing resources.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY

Access control method and device

The invention provides an access control method and device. The method comprises the steps: receiving an access request of a target user, wherein the access request carries a token; matching user data of the target user according to the token; determining a user role to which the target user belongs according to the user data; calling a request rule base, and obtaining a request rule associated with the user role in the request rule base; and determining whether the access request is matched with the associated request rule, and if yes, determining that the access verification is passed. Through the scheme, the problems of low security degree and overlarge data load in the existing access control process are solved, and the technical effects of accurate security control and relatively low data load are achieved.
Owner:CHINA CONSTRUCTION BANK

Method and device for reading network access control parameters

Embodiments of the present invention provide a method and device for reading network access control parameters. The method for reading the network access control parameters of the present invention includes: the user equipment UE reselects back to the serving cell, or the UE switches from a dedicated state to a non-dedicated state in the serving cell; the UE acquires the network status identifier of the serving cell; Flag to determine if the system message block needs to be read. In the embodiment of the present invention, the call optimization system information block reading method reduces the power consumption caused by unnecessary reading of the system information block by the UE, so that the UE can update the stored system information block information in a timely manner, which is consistent with the network side. In order to make network access control more accurate.
Owner:HUAWEI TECH CO LTD

Method for reporting base station LECENSE capability

Using RESOURCE STATUS INDICATION signaling message or AUDIT RESPONSE signaling message carries LICENSE capability indication information (CII) and reports CII to base station controller. Concretely, it is realized by using the said signaling messages to carry resource group IE, and setting up Local Cell Group ID as systemic uncommon specific value in signaling message or adding field to carry CII. The invention makes software capability limited base station possible to report actual capability and rules of resource expenditure precisely. Thus, base station controller can master resource capability and condition of use in base station accurately in order to use techniques that need to know condition of resource use of base station in advance such as admittance control etc.
Owner:HUAWEI TECH CO LTD

Application front-end access method including multiple modules, module registration method and device

The invention provides an access method of an application front end comprising multiple modules, which comprises the following steps that: firstly, enabling the application front end to receive request information of user login, and determine an accessible module of which a user has access permission according to the request information of the user; and calling a standard module definition table of the module according to the determined accessible module, reading the module configuration information in the standard module definition table, and confirming the module type; and finally, calling an operation environment of the module or a loader of the module to operate or load the accessible module according to the type of the modules. Unified standards are adopted to standardize the modulesof different architectures, so that the modules can be unified in online standards and cooperate with one another, and unified user experience is achieved. The invention further provides a method forcalling the modules by the module scheduling engine, an access device of the application front end comprising the multiple modules, a module registration method, a module registration system, a modulecalling method and a system for accessing the multiple modules to the application front end.
Owner:PEOPLE'S INSURANCE COMPANY OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products