Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

93 results about "Superuser" patented technology

In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor. In some cases, the actual name of the account is not the determining factor; on Unix-like systems, for example, the user with a user identifier (UID) of zero is the superuser, regardless of the name of that account; and in systems which implement a role based security model, any user with the role of superuser (or its synonyms) can carry out all actions of the superuser account. The principle of least privilege recommends that most users and applications run under an ordinary account to perform their work, as a superuser account is capable of making unrestricted, potentially adverse, system-wide changes.

Multi-constituent attribution of a vendor's product catalog

ActiveUS8069096B1Simple and efficientSimple and complex business termCommerceDatabaseEnd user
A single instance, multi-tenant procurement system, includes an access module to provide access to a plurality of end users associated with an organization to their respective accounts, each account being customized by a super user of the organization, a search engine to execute searches for products offered by one or more suppliers, a transaction module to process and track one or more requisitions generated by the plurality of end users, a business rules module to apply business rules established between the organization and the one or more suppliers to process the requisitions, and a data repository to store data generated on the system.
Owner:SCIQUEST

Thin hypervisor for native execution of unsafe code

A system, method and computer program product for implementing a thin hypervisor. The thin hypervisor does not have any association with a VM. The thin hypervisor serves as a wrapper over hardware capabilities of a processor. The processor has privileged low-level capabilities EPT VTX, AMD V and the ARM has virtualization technology. In order to use processor hardware capabilities and receiving root privileges, the system operates in a “super user” mode. The VM operates in a VM environment with kernel privileges in a user mode. A super user space is created in a safe mode. A user space application (or a process) is created. A user space virtualization framework library is used. These entities are separated by a user space and a kernel space. A thin hypervisor is implemented in the user space.
Owner:PARALLELS INT GMBH

Method and system for transferring money in business-to-business internet transactions

A method for enabling two businesses to complete a transaction that includes payment from one business (the buyer) to another business (the seller). A payment enabler operates the money transfer service over a computer network of nodes, such as the Internet. Typically, the buyer and the seller use the money transfer service of the payment enabler to consummate a transaction that they have arranged over the computer network through a business-to-business transaction facilitator that enables businesses to arrange deals over the computer network. During registration with the payment enabler, a buyer typically provides information about a bank account from which the seller will be paid, and the seller typically provides information about a bank account for receiving the funds from the buyer. The payment enabler facilitates payments for transactions between businesses by enabling the employees of a business registered with the payment enabler to direct the various phases of the payment process on behalf of the business for which those employees work. A super user employee, identified by the business during registration with the payment enabler, has the power to register other employees of the business with the payment enabler and to specify the privileges that the payment enabler should grant each employee to act on behalf of the business.
Owner:THE WESTERN UNION CO

Method and mobile terminal for realizing root request management through manufacturer server

The invention provides a method and a mobile terminal for realizing root request management through a manufacturer server. After the mobile terminal is used to grant a user root authority through the manufacturer server, a SU program is pushed to a system/bin directory, and an improved version Superuser.apk is installed, the APK has the manufacturer cloud server interaction capability to send various root authority escalation requests on the mobile terminal to the manufacturer server, and the manufacturer server is used to establish a sqlite database file according to an unique IMEI number of the mobile terminal to manage the root authority request white list and black list. The evaluation information of the server on the authority escalation request safety is fed back to the mobile terminal for being referenced by end users in the judgment process; and a message of the agreement of authority evaluation is sent to the server for finally determination, and a corresponding authority evaluation command executed after the determination message which is fed back is acquired by the mobile terminal. According to the invention, not only the user can get the root authority permission, and but also the root environment of the user can be managed, controlled and effectively reminded by the manufacturer server.
Owner:天津汇智网络科技有限公司

Dynamic, customizable, controlled-access child outcome planning and administration resource

A cloud-based access to child care planning and outcome resource is described. The resource allows multiple end-users to access content related to child care. Such content includes reports, table, graphs, multimedia, lists, forms, reminders, and / or other appropriate elements. The content may be presented via one or more graphical user interfaces (GUIs). Each such GUI may include various input elements such as tabs, buttons, icons, etc. and various content elements such as portlets, or frames, etc. Each GUI may be customized for a particular end-user and / or a particular group of end-users. In this way, an administrator or super-user may generate multiple GUIs, where each is associated with a user group (e.g., parents, teachers, administrators, etc.). In addition, each end-user may be able to customize the GUIs available to the end user. Such customization may include selection of input and / or content elements, layout of elements, graphical features, and / or other appropriate customizations.
Owner:NULINX INTL

Authorization control method aimed at server

The present invention relates to an authorization controlling method aiming at the servers. The present invention controls the quantity of the users who are using the servers, solves the problem that the control of the server admitting authorization is easy to be cracked, realizes the controls of the users with different categories, namely the quantity of the super users, the quantity of the data maintaining users, the quantity of the VIP users and the quantity of the normal users who are on line; the double restoring of the softdog and the disk document is adopted for the admitting authorizing document restoring medium; a the double validating of the softdog and the local document is also adopted for the validation of the admitting authorizing document and the encrypting methods are used by mixing variety of encryptions so as to elevate the reliability of the authorization.
Owner:北京意科能源技术有限公司

Sub-zone protecting method and device of Android system

ActiveCN104268462AEffective control authority switchingFree from malicious tamperingDigital data authenticationPlatform integrity maintainanceUser PrivilegeComputer science
The invention provides a sub-zone protecting method and device of the Android system. The method comprises the following steps: setting mounting commands in system kernel and enabling all mounting commands carry with nosuid properties; adding identification information to a default directory, wherein the identification information is used for showing that the directory is a protected sub-zone; transferring the mounting commands; determining whether the directory of the mounting command objects contains the identification information; if so, stopping performing the mounting commands; otherwise, performing the mounting commands. According to the technical scheme, the method and device have the advantages that the authority management mechanism is perfected; in addition, the security defense scheme is further set under the condition that vulnerability occurs in the authority management defense; therefore, the user authority switching can be effectively controlled, and meanwhile, the protected sub-area and the file in the protected sub-area can be prevented from malicious tempering; moreover, the sub-zone can be prevented from malicious tempering after the superuser authority is obtained by a special mode.
Owner:银捷尼科(福建)科技有限公司

Method for controlling file security of block distributed file system

The invention discloses a method for controlling the file security of a block distributed file system. The method includes that a distributed storage system is logically divided into a plurality of subsystems, each subsystem comprises a super user and user list files, the subsystems adopt public secret key encryption algorithms, private keys of the super users are stored in an offline manner, and private keys of users are only stored on clients after being generated; the subsystems record logs for all operation and abstract the logs by the aid of Hash trees, hash values of root nodes of the most recently operated Hash trees are reserved on the clients, whether the file system is illegally modified or not is judged by means of comparing the Hash values on the clients to hash values on servers, and the consistency of the file system which is operated by the multiple users is checked by the aid of a version-vector algorithm. The method has the advantages that the storage security is provided for the distributed file system, trust management is carried out on the distributed file system, and whether files are reliable and correct or not still can be detected even under the condition that the servers are unreliable.
Owner:ZHEJIANG UNIV

Safety decentralization management system of distribution type network management platform

InactiveCN1556615AFlexible managementAchieve security decentralization managementData switching networksLower gradeNetwork communication
The invention provides a secure decentralized managing system for a distributed network managing platform, which belongs to computer network communication field. The slave objects of the network device and the network device are used as network managed object to be stored in the network managing system, the network managing system has a default super user, the super user creates the network managing user, the network managing user creates the subjacent user, the network managing object is allocated to the network managing user through super user, the upper grade network managing user allocates the network managing object to the lower grade of user, each user has a network managing object assemble, when the network user logs in the network management, the network security model carries on the check to the operation permission of the login user according to the network managing object assemble. The network managing security model judges the relation between the object assemble and the object needed to be operated, it determines the efficiency of the network managing user operation, thus realizes the decentralized managing to distributed network platform.
Owner:HUAWEI TECH CO LTD

Database access supervision method

The invention discloses a database access supervision method, which comprises the following steps: 1) deploying a database supervision server before a database is deployed, intercepting access to the database through an application layer proxy technology, and putting all pieces of database access under the control of the supervision server; 2) controlling a user name and a password for connecting the database, and adopting a one-time one-authorization way for a database connection request to guarantee the controllability of database connection; 3) identifying the fingerprint of the application system to control the application system which can access the database to guarantee the credibility of the application system; and 4) analyzing, checking, auditing and controlling a SQL (Structured Query Language) statement which accesses the database. The database access supervision method can avoid a phenomenon that a user optionally directly connects with the database to operate, monitors all database access activities, can effectively improve the safety of a database system, and overcomes harm which may be caused to database safety by a superuser, the backdoor and the bug of a database management system, the bug of the application system and the like.
Owner:GUANGXI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products