Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

68results about How to "Flexible Access Control" patented technology

Multistage authority management method for cloud storage enciphered data sharing

The invention relates to a multistage authority management method for cloud storage enciphered data sharing. The methods such as attribute based encryption, access control and authority management are used for providing a reliable method for access and multistage authority management of a shared cipher text in the cloud storage environment. Through mixing encrypt system, the multistage authority management method for cloud storage enciphered data sharing comprises steps: firstly applying a symmetric encryption algorithm to encrypt data, and generating a content cipher text; then adopting the attribute based encryption to encrypt according to different authority information, and generating an authority cipher text; adopting the attribute based encryption scheme to encrypt a symmetric key and the authority cipher text, regarding the symmetric key and the authority cipher text as a file header of the content cipher text, and generating a final cipher text. The multistage authority management method for cloud storage enciphered data sharing has the advantages of being convenient to achieve, strong in user information protectiveness, fine in authority control grit and the like. Under the premise that a server is not credible, the flexible and extensible authority management to the shared enciphered data is supported, the privacy and the security of the user data and authority information are effectively ensured, and the multistage authority management method for cloud storage enciphered data sharing has good practical value and wide application prospect in the cloud storage field.
Owner:HANGZHOU YUANTIAO TECH CO LTD

High security removable storage device

The invention provides a high security removable storage device which comprises a safe main control chip, a chip operating system (COS) arranged in the chip, a flash memory and removable storage device safety management software arranged in the flash memory, wherein the COS system is stored in the safe chip and is used for managing the authority certificates corresponding to users; the removable storage device safety management software adopts a memory sandbox technology, and is used for monitoring and filtering various operations which are carried out on a removable storage device by the users and programs, checking the device service environment and the access authority of the removable storage device by being matched with the COS system, controlling the unauthorized use behaviors of data files of the removable storage device decoded to the memory, and recording various key sensitive operations. The high security removable storage device adopts an integral protection technology combining software and hardware, so that the security access control of the removable storage device can be realized, and the users having different authorities have different data views and fine grit operation authorities for the removable storage device; therefore, the users are prevented from privately copying the files and the content in the removable storage device, and the data of the removable storage device is prevented from being broken and stolen by viruses and Trojan horses.
Owner:张永昌

Safe USB flash disk and data active protection method thereof

The invention provides a safe USB flash disk and a data active protection method thereof. The safe USB flash disk comprises a safe main control chip, a chip operating system (COS) in a chip, a Flash memory and USB flash disk safe management software built in the Flash memory, wherein the COS system is used for storing and managing an authority certificate corresponding to a user; and the USB flash disk safe management software is used for monitoring and filtering various operations carried out on the USB flash disk by the user and a program, checking use environment and access authority of the USB flash disk equipment in cooperation with the COS system, controlling a unauthorized use behaviour of a USB flash disk data document which is deciphered to the memory and recording various key sensitive operations by adopting a memory sandbox technology. Since the USB flash disk adopts a hardware-software integrated protection technology, the safe access control of the USB flash disk is realized and users having different authorities have different USB flash disk data views and fine-grit operation authorities so that users can be prevented from privately copying documents and contents in the USB flash disk and the USB flash disk data is prevented from be destroyed and stole due to viruses and Trojans.
Owner:CHANGSHA WENDUN INFORMATION TECH

Method and a system for controlling user data reading and writing security rights based on roles and resources

The technical proposal of the invention comprises a method and a system for controlling user data reading and writing security rights based on roles and resources, which are used for realizing the following functions: controlling application program rights, including executing corresponding security rights control on database table level, field level and record level data at the front and back ends of the application program; controlling user data reading and writing security rights based on roles and resources. Work order data permission control, including work order administrator role, workorder adding permission, work order content viewing permission, work order content modifying permission and content operation permission to implement corresponding permission security control; Reporting permission control, including the addition of permission assertions to the report file, is used to determine access and/or modified objects, and to perform access control based on the determinationresults. The invention has the advantages that the user-defined matching can flexibly define various complicated fields or report screening conditions; Flexible and changeable table level, field level and record level omni-directional matrix permission control can be realized.
Owner:珠海伟诚科技股份有限公司

Enterprise file collaboration and access control method and system based on RABC

The invention provides an enterprise file collaboration and access control method and system based on RABC.Users in an enterprise, outside collaborators and groups are configured in an RABC model to obtain a collaborative relationship to participate in collaboration of enterprise files.Role authorities corresponding to the users in the enterprise, the outside collaborators and the groups are verified through the authorities of the roles, an original model is expanded, conceptions of the groups and the outside collaborators are introduced, and control management is more convenient and flexible.The roles can be separated from the users and the groups, the roles can be separated from the authorities, each user owns one role, and each role owns a corresponding authority set; the users can own different collaboration authorities for different files or folders by changing the roles, and the corresponding relationships between the roles and the authorities are automatically adjusted; access control of the users judges whether corresponding operating authority items are owned or not through the roles of the users on the files.The access control implementation difficulty is simplified, and front authority verification sets rear role authority verification.
Owner:杭州奇亿云计算有限公司

Access control method, system and device and access behavior identification method, system and device and storage medium

The embodiment of the invention provides an access control method, system and device, an access behavior recognition method, system and device, and a storage medium, and the access control method comprises the steps: receiving an authority obtaining request generated by a current application program when the current application program requests to access target data; obtaining access behavior information of at least one previous application program to the target data from the access reference information corresponding to the target data; adjusting the access permission of the current application program to the target data according to the access behavior information of the at least one previous application program to the target data; and controlling the access of the current application program to the target data according to the adjusted access permission. In the embodiment, when access control is carried out on the target data, data change details in a full link used by the target data are comprehensively considered, and the access permission of the application program can be dynamically adjusted according to the data change details, so that the access control on the target datais more reasonable and more flexible.
Owner:ALIBABA GRP HLDG LTD

Course selection system based on attribute passwords

The invention belongs to the technical field of teaching equipment, and particularly relates to a course selection system based on attribute passwords. The system comprises a login management unit, ateacher unit, a student unit and a teacher unit. The teacher unit comprises a course selection student viewing module and a course information modification module; the student unit comprises a courseinformation query module, a course selection module, a course quitting module and a personal repair and reading condition query module; the educator unit comprises a course management module, a student management module and a teacher management module; the login management unit is responsible for carrying out identity verification on students, teachers and administrators and carrying out corresponding function operations; according to the system, identity information of a user is described by using a group of attributes, an encryption party encrypts the information by using the same public keyand a specific access structure, and the information can be decrypted only when the user has an attribute combination meeting the requirements of the access structure; according to the system, the safety and privacy of course data can be guaranteed, and the time cost can be reduced.
Owner:FUDAN UNIV

A Method of User Authorization on Demand Supporting Least Privilege

The invention discloses a user on-demand authorization method capable of supporting least privilege. The method comprises the following implementation steps: establishing a plurality of roles in an operating system, and setting a verification password for each role; defining different permission classes needed by running of different application programs as different permission types; associating a user with the corresponding role and the corresponding permission type of the role during login, wherein role conversion or permission type conversion can be carried out according to program requirements; finally extracting the current role and the permission type information of the user, judging whether a program requested by the user is allowed to be executed or not on the basis of the current role and the permission type of the user, if yes, executing the program requested by the user, and otherwise, prohibiting executing the program requested by the user. According to the method, authorization can be carried out according to actual permission requirements of different applications, the applications only have associated permissions to complete normal functions when the user executes the applications, the safety is guaranteed, the usability of the system is improved, the generality is high, and the application range is wide.
Owner:NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products