Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

83 results about "Resource security" patented technology

Resource Security. Access to minerals means a more secure America. Minerals are among the most important components in the technologies protecting our nation. Minerals, Supply Chain and National Defense. Access to minerals is crucial for a more secure America. Minerals are the basic components that make up the technologies protecting our nation.

Data resource security control method in thin client mode

The invention belongs to the field of network security, and particularly relates to a data resource security control method in a thin client mode. The data resource security control method in the thin client mode comprises eight subsystems, namely the identity authentication subsystem, the remote application service subsystem, the security label subsystem, the file access control subsystem, the security communication subsystem, the security audit subsystem, the security storage subsystem and the management platform subsystem. Storage and control of files are mainly performed on a background server, the files are stored in different partitions according to user types or security levels of the files, the files are stored and protected, and a server side can not recognize the content of the files. When a user needs to have access to and process the files, the user logs in on a browser, identity authentication is conducted between the user and a server, and then file access connection is established. The files of a thin client are processed on the server side (provided by a physical application server or a virtual application server), no application or agent needs to be installed on the thin client, and interface interoperability is supported by related services released by remote application services.
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

Open platform authorization and authentication system and method based on OAuth protocol

ActiveCN106534175AConvenient authorization and authentication operationsAvoid Repeated Authorization and AuthenticationTransmissionAcquisition timeOpen platform
The invention discloses an open platform authorization and authentication system and method based on an OAuth protocol, and mainly aims to solve the problem of misuse of a resource access token since the valid time of the resource access token is not optimized or limited reasonably in the prior art. The system comprises an authorization client and an authorization server, wherein the authorization client is used for transmitting an authorization and authentication request, receiving the resource access token and the valid time of the token through function modules inside the authorization client, and resetting the valid time of the token according to acquisition times and time of user resources; and the authorization server is used for receiving and checking the authorization and authentication request, acquiring an unauthorized access token and the valid of the token through function modules inside the authorization server, generating a resource access token and the valid time of the token, and transmitting the resource access token and the valid time of the token to the authorization client. Through adoption of the open platform authorization and authentication system and method, an authorization and authentication process is simplified, and the resource security is improved. The open platform authorization and authentication system and method can be applied to an authentication and authorization process during acquisition of open platform resources.
Owner:XIDIAN UNIV

A method and system for implementing resource personalized security access control

The present invention discloses a method and system for realizing resource individualized security access control, which can obtain the characteristic identity information associated with the user by the context awareness module, as well as the environment and resource capability characteristic information associated with the identity information; the change of the characteristic information After the situation is filtered and processed by the context awareness module, a corresponding event is formed and notified to the security policy module. The security policy module determines the real-time security policy of the user based on the change of the user context and the set of basic security policies; During the configurable life cycle of the policy, the authentication module and the authorization module obtain the user's real-time security policy from the security policy module, and dynamically update the user's authentication mechanism and authorization mechanism accordingly. The method and system of the present invention combine user context awareness technology with corresponding user real-time security policies, and can effectively support the continuity and dynamics of Internet of Things resource security services.
Owner:ZTE CORP

Resource control method on sharing network element, sharing network element and relevant equipment

The embodiment of the invention provides a resource control method on a sharing network element, a sharing network element and relevant equipment, so as to solve the resource safety problem when the sharing network element with telecommunication merging is managed by a webmaster proposal in the prior art; the method comprises the following steps: an operational management command for controlling the resources on the sharing network element by a user is received; operator attribute of controlled resource is obtained and operator attribute of the user is obtained according to the operational management command; if the operator attribute of the user is consistent to the operator attribute of the controlled resource, the control action corresponding to the operational management command is carried out. The method solves the webmaster safety problem when a plurality of operator webmasters are merged under the telecommunication merging.
Owner:SHANGHAI HUAWEI TECH CO LTD

Security system for cloud data center

The invention discloses a security system for a cloud data center, which is applied to security protection of the cloud data center. The security system comprises a conventional security layer, which is used for carrying out security protection on the periphery of the cloud data center through a boundary security reinforcing method; a virtual resource security layer, which is used for carrying out security protection on virtual resources in the cloud data center through isolating the virtual resources; and a virtual resource platform security layer, which is used for a security tool based on a virtual architecture to monitor a virtual machine to carry out security protection on a virtual resource platform in the cloud data center. According to the security system, security protection is fully carried out on the cloud data center from protection of the conventional security layer to protection of the virtual platform layer to the security protection of the virtual resource layer.
Owner:INSPUR BEIJING ELECTRONICS INFORMATION IND

Business resource security control system

InactiveCN105450660ASingle sign-on implementationDigital data authenticationTransmissionControl systemInternet privacy
The invention provides a business resource security control system, comprising a security warning device, an access control device and a log management device, wherein the security warning device is used for providing a differential level authentication way, matching or combining the authentication way according to an application level, providing corresponding security strength for corresponding business and continuously storing the corresponding security strength in a corresponding security information database; the access control device is used for controlling the permissions of resources with different categories or levels in a business procedure according to a security policy and continuously storing permission control data in the corresponding security information database; and the log management device is used for recording operations of related permissions in the system and the business procedure and continuously storing the operations in the corresponding security information database. Single sign-on of unified users is formed, a platform business norm is integrated according to the applications and the business system, the users and the permissions are uniformly managed, other mutually integrated systems are accessed online within the permission range, and single sign-on is realized.
Owner:BEIJING ANTUO SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products