Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

32results about How to "Flexible Authorization" patented technology

Method and system for authorization of software function modules of internet of things

The invention provides a method and system for authorization of software function modules of the internet of things. The system for authorization at least comprises at least one terminal device, an operator operation platform communicated with the terminal device through a first network and an authorization authentication server communicated with the operator operation platform through a second network. The terminal device is used for starting an authorization procedure and can form a uniqueness mark through acquisition of relevant information and authorize the corresponding function module according to returned first authorization code information. The operator operation platform is used for processing authorization requests and the like of the terminal device. The authorization authentication server is used for managing secret keys of the terminal device and the operator operation platform and automatically generating the first authorization code information, second authorization code information and the like according to the uniqueness mark. According to the method and system, independent authorization can be conducted according to functions and function points of software, the version safety of the software is guaranteed, authorization is achieved according to the requirements, version management conducted by an operator is facilitated, and the operator can know the application condition of the software so as to further improve the software.
Owner:上海农业信息有限公司 +2

Searchable encryption method based on wildcard character in cloud storage safety

The invention relates to a searchable encryption method based on wildcard character in cloud storage safety. The method comprises the following steps that: setting a document to be uploaded; extracting a keyword set; encrypting the keyword set; selecting a random number as a document encryption key, and encrypting the document encryption key; encrypting the document to be uploaded to obtain a ciphertext, and sending the ciphertext to a cloud computing platform; input a query keyword set, generating a query trapdoor, carrying out signature, and sending the signature to the cloud computing platform; verifying a query signature by the cloud computing platform, and executing a search algorithm by the cloud computing platform; transmitting a keyword index and the query trapdoor into a keyword matching protocol to obtain an encryption matching result; carrying out decryption to obtain a search result; according to the search result, returning a corresponding ciphertext by the cloud computing platform; and recovering the document encryption key, and recovering the document. By use of the method, the keyword search of at most two wildcard characters can be supported, the wildcard character can appear on any position of the keyword, and a plurality of random characters can be represented.
Owner:FUZHOU UNIV

Electronic passport expansion access control system and authentication method based on identification cipher technology

The invention discloses an identification cryptographic technique-based electronic passport extended access control system and an identification cryptographic technique-based authentication method. The authentication method comprises the following steps that: a key service centre provides a key service; a passport verification center makes an application for sensitive biological characteristic information-reading authority, the key service center issues an authorization smart card to perform authorization, and the passport verification center distributes the authorization smart card to a verification terminal controlled thereby; and a passport issuing center applies the key service center for an authentication key and a public parameter for authentication and writes the authentication key and the public parameter into passport smart card of an electronic passport. During passport verification, the authorization smart card and the passport smart card implement an identification cryptographic algorithm-based authentication protocol to judge if the verification terminal has the authority to read sensitive biological characteristic data. The system and the method avoid loopholes in authentication trust transmission in a European proposal, save the establishment of a complicate PKI system, and allow for low system construction cost. Compared with Singaporean EAC, the method provides flexible authorization for a certifying organization, and can still authorize the certifying organization after the issue of a passport.
Owner:WUHAN TIANYU INFORMATION IND

Static authentication method capable of aiming at SQL (Structured Query Language) analytical query

The invention provides a static authentication method capable of aiming at SQL (Structured Query Language) analytical query. The method comprises the following steps of: S1: obtaining the SQL analytical query submitted by a user; S2: constructing a genealogical tree from the SQL analytical query; S3: on the basis of the genealogical tree, extracting a data access request of the SQL analytical query; and S4: on the basis of an access control rule, authenticating the data access request. Compared with an existing database access control technology, the static authentication method combines the characteristics of the analytical query to support simultaneous access to a plurality of columns and control for an operation. Therefore, by use of the method, the SQL analytical query can be more flexibly and accurately authenticated. Meanwhile, by use of the method, an administrator is permitted to carry out permission management through the compiling of the access control rule, in addition, no extra burdens are brought to users, and therefore, the static authentication method exhibits better availability. Finally, the method carries out authentication only on the basis of the SQL analytical query, so that an authentication process is more efficient, and the method is suitable for a large-scale data analysis scene.
Owner:TSINGHUA UNIV

OCS traffic authorization method, OCS, server and readable storage medium

ActiveCN109995539AMeet actual traffic business needsEnhance traffic service experienceMetering/charging/biilling arrangementsTraffic capacityService experience
The invention discloses an OCS traffic authorization method, an OCS, a server and a readable storage medium. The method is used for solving the technical problem that in the prior art, the mode of carrying out dynamic authorization configuration by an OCS is not flexible enough, and consequently the authorization configuration accuracy of a user is low. Therefore, the flexibility of flow authorization configuration is improved, different flow authorizations can be realized for different users to meet the actual flow service requirements of the users as much as possible, and the flow service experience of the users is enhanced. The method comprises the following steps: creating a flow authorization model according to Internet behavior data of a terminal user and service characteristics of an ordering service; obtaining a traffic service request sent by a terminal device corresponding to the terminal user; inputting the traffic service request into the traffic authorization model to obtain predicted traffic authorization information for the traffic service request; and sending the predicted flow authorization information to a PGW, so that the predicted flow authorization informationis forwarded to the terminal equipment through the PGW.
Owner:CHINA MOBILE GROUP JILIN BRANCH +1

Method for realizing remote monitoring and authorization of tramcar based on BIM+AI

The invention provides a method for realizing remote monitoring and authorization of a tramcar based on BIM+AI. The method comprises the following steps of acquiring tramcar running related information in real time by adopting an information acquisition module; transmitting the acquired tramcar running related information to an information processing module, enabling the information processing module to carry out computational analysis on the information and storing corresponding data through a data storage module, and processing an analysis result through a BIM module and displaying the analysis result through a display module. According to the method, a building information model technology is adopted, and simulation and schematic equipment and data display modes in the traditional urbantramcar industry are broken, accurate display of tramcar running lines, vehicles, stations, equipment and the like on a three-dimensional comprehensive monitoring platform is realized, real-time on-spot remote monitoring of the tramcar is realized, an artificial intelligence technology is applied to a comprehensive management system of the tramcar, and fine and flexible authorization in a tramcaroperation and maintenance management process is realized.
Owner:深圳众维轨道交通科技发展有限公司

Multi-authority group inheritance management method and device based on distributed control

ActiveCN111967036BAvoid Duplicate Permission SituationsThere will be no problem of repeated configurationDigital data protectionTransmissionAuthorizationDistributed computing
The invention discloses a multi-weight group inheritance management method and device based on distributed control. The method comprises the following steps that a corresponding authority group node is formed according to an authority group of an account; node marks are generated according to the authority group nodes; the first account sends the corresponding first node mark to the second account; the second account records the first node mark in an authority group of the second account; the second account calls the first node mark in the second permission group to access the permission groupof the first account, and calls the permission granted by the first account. Authorization between accounts is carried out by using a permission group node mark form; during permission inheritance, an inherited permission can be called by recording a node mark corresponding to a permission group, and therefore the problems that a permission list formed by a traditional permission list recording mode is large in capacity and traditional authorization is inconvenient to manage are prevented; operations of authorization and permission inheritance can be carried out between any accounts through the method, and decentralized distributed operation is achieved.
Owner:成都掌控者网络科技有限公司

Electronic passport expansion access control system and authentication method based on identification cipher technology

The invention discloses an identification cryptographic technique-based electronic passport extended access control system and an identification cryptographic technique-based authentication method. The authentication method comprises the following steps that: a key service centre provides a key service; a passport verification center makes an application for sensitive biological characteristic information-reading authority, the key service center issues an authorization smart card to perform authorization, and the passport verification center distributes the authorization smart card to a verification terminal controlled thereby; and a passport issuing center applies the key service center for an authentication key and a public parameter for authentication and writes the authentication keyand the public parameter into passport smart card of an electronic passport. During passport verification, the authorization smart card and the passport smart card implement an identification cryptographic algorithm-based authentication protocol to judge if the verification terminal has the authority to read sensitive biological characteristic data. The system and the method avoid loopholes in authentication trust transmission in a European proposal, save the establishment of a complicate PKI system, and allow for low system construction cost. Compared with Singaporean EAC, the method provides flexible authorization for a certifying organization, and can still authorize the certifying organization after the issue of a passport.
Owner:WUHAN TIANYU INFORMATION IND

A static authorization method for SQL analysis query

The invention provides a static authentication method capable of aiming at SQL (Structured Query Language) analytical query. The method comprises the following steps of: S1: obtaining the SQL analytical query submitted by a user; S2: constructing a genealogical tree from the SQL analytical query; S3: on the basis of the genealogical tree, extracting a data access request of the SQL analytical query; and S4: on the basis of an access control rule, authenticating the data access request. Compared with an existing database access control technology, the static authentication method combines the characteristics of the analytical query to support simultaneous access to a plurality of columns and control for an operation. Therefore, by use of the method, the SQL analytical query can be more flexibly and accurately authenticated. Meanwhile, by use of the method, an administrator is permitted to carry out permission management through the compiling of the access control rule, in addition, no extra burdens are brought to users, and therefore, the static authentication method exhibits better availability. Finally, the method carries out authentication only on the basis of the SQL analytical query, so that an authentication process is more efficient, and the method is suitable for a large-scale data analysis scene.
Owner:TSINGHUA UNIV

Internet of things software function module authorization method and system

The invention provides a method and system for authorization of software function modules of the internet of things. The system for authorization at least comprises at least one terminal device, an operator operation platform communicated with the terminal device through a first network and an authorization authentication server communicated with the operator operation platform through a second network. The terminal device is used for starting an authorization procedure and can form a uniqueness mark through acquisition of relevant information and authorize the corresponding function module according to returned first authorization code information. The operator operation platform is used for processing authorization requests and the like of the terminal device. The authorization authentication server is used for managing secret keys of the terminal device and the operator operation platform and automatically generating the first authorization code information, second authorization code information and the like according to the uniqueness mark. According to the method and system, independent authorization can be conducted according to functions and function points of software, the version safety of the software is guaranteed, authorization is achieved according to the requirements, version management conducted by an operator is facilitated, and the operator can know the application condition of the software so as to further improve the software.
Owner:上海农业信息有限公司 +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products