Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

185results about How to "Convenient access control" patented technology

System and method for real-time cloud simulation on Internet of things sensing device

The invention discloses a system and a method for real-time cloud simulation on an Internet of things sensing device. The system comprises the Internet of things sensing device, an Internet of things gateway device, a cloud device simulation center and an MQTT (Message Queuing Telemetry Transport) server; the Internet of things sensing device is an intelligent sensing device which is accessed to a sensing network; the Internet of things gateway device is used for providing the access for a heterogeneous sensing network; the cloud device simulation center comprises a simulation data processing module and a simulation node module, wherein the simulation data processing module is used for receiving, pushing and processing simulation data, the simulation node module is used for establishing cloud simulation nodes, and the cloud simulation nodes and the Internet of things sensing device are maintained to be synchronized; the MQTT server is an interaction intermediary of the Internet of things sensing device and the cloud simulation node which is corresponding to the Internet of things sensing device. According to the system and the method for the real-time cloud simulation on the Internet of things sensing device, the cloud simulation node which is corresponding to the Internet of things sensing device is established at the position of a cloud according to real-time data sent from the Internet of things sensing device to enable the functions of the cloud simulation node to be as same as the functions of the Internet of things entity sensing device and accordingly the access of the cloud application service to the entity sensing device and the operation of the cloud application service on the entity sensing device are convenient.
Owner:河南金路网络科技股份有限公司

Attribute-based encryption method for achieving hierarchical certification authority

ActiveCN103647644AFacilitate hierarchical distributionEase of distributed managementKey distribution for secure communicationPublic key for secure communicationCiphertextAttribute-based encryption
The invention discloses an attribute-based encryption method for achieving a hierarchical certification authority. The attribute-based encryption method for achieving the hierarchical certification authority mainly comprises the following steps of 1) initialization of a central authority; 2) initialization of multilayer certification authorities; 3) user registration and certification; 4) extraction and distribution of private keys; 5) encryption; 6) decryption. The attribute-based encryption method for achieving the hierarchical certification authority achieves hierarchical distribution of multiple certification authorities on the basis of an attribute-based encryption system of a ciphertext policy, facilitates management of the central authority to the certification authorities, and is applicable to shared data encryption solution in a large organization structure of hierarchical distribution. Besides, during the extraction and distribution process of the private keys, overlapping among attribute sets of different users is allowed, so that the attribute-based encryption method for achieving the hierarchical certification authority has wider adaptability in practical application.
Owner:BEIHANG UNIV

Cryptograph index structure based on blocking organization and management method thereof

InactiveCN101655858AEfficient security structureEfficient security maintenance mechanismDigital data protectionSpecial data processing applicationsInternal memoryTimestamp
The invention discloses a cryptograph index structure based on a blocking organization and a management method thereof. Aiming at a blocking cryptograph index structure, an index establishing mode based on combination is firstly adopted to establish a plain text index when the index is established, and then the plain text index is blocked and encrypted in a unitive way. A maintenance mechanism based on a cryptograph index is divided into the addition, the deletion and the modification of a document in the index. The addition of the document is mainly divided into two conditions of batch addition and littleness addition; in the batch addition, a temporary index is established on a disc; and in the littleness addition, an internal memory index is established. In the deletion of the document,a deletion mark is firstly made on the document to be deleted, and the document is deleted in a unitive way until a proper opportunity. In the modification of the index, an original document is firstly deleted, and then a novel document is anew added. In a key management strategy, stratification management is carried out on an index encryption key, and the update of the key is realized by a timestamp mechanism. In an access control strategy based on the index, access control information is integrated into the index, and the access control of document level granularity is realized.
Owner:HUAZHONG UNIV OF SCI & TECH

Entrance guard management method and system

InactiveCN105389870AEnable mobilityImplement role hierarchy managementIndividual entry/exit registersEffective timeComputer science
The invention discloses an entrance guard management method and system. The method comprises the steps that a back-end processing center receives a registration request instruction of a creator and allocates a cluster for the creator after registration conditions are met; the back-end processing center adds corresponding members to the cluster according to a received member addition instruction; the back-end processing center allocates corresponding characters to the members in the cluster according to a received character setting instruction; the back-end processing center sets entrance guard use permissions for the corresponding members in the cluster according to a received entrance guard use permission setting instruction, and each entrance guard use permission comprises virtual entrance guard serial number information and effective time information corresponding to the virtual entrance guard serial number information. According to the entrance guard management method and system, mobile management and character hierarchical management of an entrance guard are achieved, an administrator can conveniently conduct permission control on the members in the cluster, each member in the cluster can online generate a virtual key within the entrance guard use permission, the virtual keys can be shared, and great flexibility and real-time performance are achieved.
Owner:GUANGZHOU CHANGLIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products