Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

94results about How to "Easy to audit" patented technology

Routing position data secrecy storing and sharing method based on block chain

Provided is a routing position data secrecy storing and sharing method based on block chains. The routing position data secrecy storing and sharing method includes a data storing method and a data sharing method. The data storing method includes the steps of node configuration, data encryption sending, storage subnetwork verification storing, etc. The data sharing method includes the steps of demand generation, demand response, sharing achievement and the like. The effects of the invention are as follows: through a block chain technology, data sharing is realized through data encryption storage and a decentralized network to solve the problems that data storage parties have no right to use data and users do not have channels to selectively enable personal data to be accessed; local encryption sending is adopted during data storage, service parties store encrypted data, the users themselves save decryption secret keys, and the service parties have no access to original data, so a better data protection effect is achieved; and the block chain technology is adopted during storage, commonly recognized storage is realized through a practical Byzantine fault-tolerant algorithm, workload bottleneck problems of centralized storage are solved, and data is prevented from being tampered.
Owner:TIANJIN UNIVERSITY OF TECHNOLOGY

Block chain authority management method and system

The invention discloses a block chain authority management method and system. The method comprises the following steps of identifying an authority change transaction sent by a user, wherein the content of the authority change transaction comprises an initiator, an authority change user, authorities which need to be changed and corresponding change authority values; judging whether the initiator inthe authority change transaction has an authority change authority or not; if the initiator has the authority change authority, modifying an authority value of each authority which needs to be changed of the authority change user into the corresponding authority change value, and recording the executed authority change transaction into a block; and carrying out consensus on the transaction in theblock, and when the consensus passes, making the corresponding authority change transaction in the block take effect. According to the method, the authority management is directly carried out in a block chain without an external facility, and is deeply integrated into the block chain, so that all-directional permission control can be carried out on the block chain, and the authority change needsto pass through the consensus of the whole network and is recorded in the block chain, and thus the change records cannot be tampered and are convenient for auditing.
Owner:中钞信用卡产业发展有限公司杭州区块链技术研究院

Database auditing monitoring system and database auditing monitoring method

The invention discloses a database auditing monitoring system and a database auditing monitoring method. The database auditing monitoring system comprises a hardware part and a module part, wherein the hardware part comprises a switchboard, a local area network and a database auditing server, the switchboard is respectively connected into the local area network at the two ends through a duplicated port, and is connected with the database auditing server through a mirror port, the local area network at the two ends is respectively communicated with a database accessing client and a database server, and the module part comprises a WEB management module, a local database module, a data collecting module and a data analysis and processing module. The database auditing monitoring system and the database auditing monitoring method have the advantages that various kinds of operation behaviors on the database server are monitored and recorded through a monitoring module arranged in the data analysis and processing module, through the analysis on network data, various kinds of operation and hostile attack event information on the database server can be analyzed intelligently in real time and is recorded into an auditing database so that inquiry and analysis can be realized in future, and the monitoring and the auditing on the operation of a target database system are realized.
Owner:北京华电天益信息科技有限公司

Master node, slave node, system and method for mirror image management of distributed container cluster

The invention discloses a distributed container cluster mirror image management master node, slave nodes, a system and a method, wherein the main node comprises a mirror image database which is a distributed database and is used for storing node information of all nodes in the system; the request input module is used for receiving request content including a request target and command execution content; mirror image management module, the verification module is used for communicating the password and verifying whether the request content acquired by the request record input module is legal; ifit is judged that a request target in the request content is a specified single slave node or grouped slave nodes, sending a communication password and command execution content including a pulling operation, an updating operation, a deleting operation and a cleaning operation to IP addresses corresponding to the slave nodes; and receiving the state feedback content sent by the slave node. According to the invention, the flattening management of the container cluster mirror image is realized, the management efficiency of the cluster container mirror image in a distributed system is improved,and the high reliability and safety of the whole cluster are improved.
Owner:NANJING UNIV OF POSTS & TELECOMM

Operation and maintenance safety auditing method and system

The invention discloses an operation and maintenance safety auditing method. The operation and maintenance safety auditing method comprises the following steps: receiving a login request sent by operation and maintenance personnel, and verifying the login request; if the verification is passed, obtaining and storing face image information of the operation and maintenance personnel in real time, and meanwhile recording an operation and maintenance operation on operation and maintenance target equipment in real time; verifying the identity of the operation and maintenance personnel in real time according to the face image information, and judging whether the operation and maintenance operation is an illegal operation; if the verification of the identity of the operation and maintenance personnel is wrong, and / or the operation and maintenance operation is the illegal operation, sending an alarm signal and / or interrupting the operation and maintenance operation; and carrying out correlation analysis on the face image information and the operation and maintenance operation, forming an operation and maintenance link, and carrying out audit according to the operation and maintenance link. Identity authentication can be carried out on the identity of the IT operation and maintenance personnel in an operation and maintenance personnel process, and the illegal operation and maintenance operation can be found in time. The invention further discloses an operation and maintenance safety auditing system.
Owner:STATE GRID CORP OF CHINA +2

Resource uploading and resource requesting method in blockchain

The embodiment of the invention discloses a resource uploading and resource requesting method in a blockchain. The resource request method in the blockchain includes the steps that a super node in a service domain receives a request of a user node, wherein the resource request of the user node includes a resource feature value; the super node searches for segment storage information, correspondingto a content resource, in an alliance chain according to the resource feature value, and returns the segment storage information to the user node; the super node calls an intelligent contract corresponding to the resource feature value in a public chain to declare a current resource service process; the user node downloads the resource data according to the segment storage information; the user node calls the intelligent contact corresponding to the resource feature value in the public chain to pay the benefits of the parties in the current resource service process. According to the technicalsolution provided by the embodiment of the invention, the method makes the copyright information and the benefit distribution rule of a content resource be transparent in the public chain, improves the initiative of resource sharing, and reduces the risk of resource loss in the process of resource access.
Owner:SOUTH UNIVERSITY OF SCIENCE AND TECHNOLOGY OF CHINA

Building engineering cost supervision system and method based on block chain

The invention discloses a building engineering cost supervision system and method based on a block chain. The system comprises a user management module, an investment decision module, a design controlmodule, a building design module, an engineering implementation module, a supervision auditing module and a distributed file system. The invention aims to solve the problem that an existing project cost management system is insufficient in transparency. A solution is provided for solving the problems of counterfeiting and easy tampering; the information of each link of the project cost is recorded and tracked through the block chain; a public, transparent, high-credibility and traceable distributed network is constructed by using a block chain technology, so that an auditable constructional engineering cost supervision system which cooperates and mutually supervises from multiple parties including a building general contractor, a consultation service company, a survey designer, a construction party, a supervisor and the like is realized; due to the characteristics of the blockchain system, the data is prevented from being tampered, the information transparency of the system is improved, and illegal operation of illegal users is prevented.
Owner:杭州产链数字科技有限公司

Scanning device and scanning method for scanning bar code invoice

InactiveCN103400098ARealize scanningConvenient financial reimbursementSensing by electromagnetic radiationSquare waveformBarcode
The invention discloses a scanning device and a scanning method for a bar code invoice, which are used for scanning a bar code of the bar code invoice. The scanning device comprises a scanning module, a signal shaping module and a decode outputting module, wherein the scanning module is used for optically scanning a bar code sign of the bar code invoice and converting an optical signal of a bar code and bar blank pattern into an electric signal; the signal shaping module is used for amplifying the electric signal generated by the scanning module through a circuit to generate an analog signal and filtering and shaping the analog signal to form a square wave signal corresponding to the analog signal; the decode outputting module is used for interpreting the square wave signal formed by the signal shaping module into a digital signal which can be directly accepted by a computer. According to the scanning device and the scanning method disclosed by the invention, the scanning for bar codes in notes such as various bar code invoices, air tickets, train tickets and bus tickets is realized, the authenticity of the invoices can be detected, financial reimbursement, accounting and auditing of users are facilitated, financial management of the users is enabled to become efficient and accurate and the consumption of labor force and financial resources is reduced.
Owner:SHANGHAI DIANJI UNIV

Duplicating monitoring system

The invention discloses a duplicating monitoring system and relates to the technical field of computer technology and information safety. The system comprises a monitoring terminal and a server, wherein the monitoring terminal is used for locking and unlocking a duplicator to obtain identity information and image information of a duplicator user and duplicating logs and duplicating contents of a legal user, and the identity information, the image information and the duplicating logs and the duplicating contents of the legal user can be uploaded to the server by the monitoring terminal in real time, and the server is used for checking legality of the user, receiving the user's identity information, image information, duplicating logs and duplicating contents sent by the monitoring terminal, generating an audit report which includes the identity information and the image information of the legal user and the corresponding duplicating logs and contents of the legal user, and supplying inquiry of the audit report. The system has the advantages that the duplicator is controlled to be merely used by authorized users, the duplicating logs can be comprehensively, accurately and automatically recorded, simultaneously the audit report of the duplicating logs is supplied, and the system is convenient for administrative stuffs to inquire and audit the duplicating operation.
Owner:BEIJING LANXUM COMP TECH

Interaction method and system for BIOS/UEFI and virtual machine monitor

The invention is suitable for the technical field of computers, and provides an interaction method and system for BIOS / UEFI and a virtual machine monitor. The method comprises the steps: controlling BIOS / UEFI to call the corresponding initial code of the virtual machine monitor in a read-only memory when the system is powered on; decompressing and loading the corresponding initial code of the virtual machine monitor to a fixed preset address of a memory to make the virtual machine monitor take over the computer control right, and executing remote call; controlling BIOS / UEFI to detect the state of a hard disc, and calling the virtual machine monitor to carry out user partition management on the hard disc or deploy the hard disc based on the detection result; and controlling to reassign the computer control right from the virtual machine monitor to the BIOS / UEFI, and executing the normal initialization operation of the computer system and loading a user operation system to achieve the operation of the BIOS / UEFI in the virtual machine monitor. Therefore, the method overcomes the disadvantage of expensive hard-encryption of the hard disc, and can monitor any access to the hard disc.
Owner:CHINA GREATWALL TECH GRP CO LTD

Real person identity verification method

The invention discloses a real person identity verification method. The method comprises the following steps: acquiring human face picture information provided by an operator; simultaneously acquiring the human face characteristic information of the operator and the mouth shape characteristic information of the operator during reading of preset content; and comparing the human face characteristic information with the human face picture information, comparing the mouth shape characteristic information with preset standard mouth shape characteristic information, if comparison succeeds, confirming that the operator is a real person on the human face picture information, and otherwise, confirming that the operator is not the real person on the human face picture information. According to the method, the identity of the real person is judged by simultaneously acquiring the human face characteristic information and the mouth shape characteristic information without making contact with the operator, so that the popularization of the method is facilitated; comparison of the human face characteristic information is adopted, so that confirmation and auditing on whether the operator is the real person or not are facilitated, the identification accuracy is high, and the accuracy is increased; and comparison of the mouth shape characteristic information is adopted, so that others can be prevented from cracking a human face identification comparison technology by using non-real-person objects, and the security is enhanced. On-site pictures can be stored, and a monitoring function is realized.
Owner:SUZHOU YOUHUA INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products