Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

331results about How to "Implement access control" patented technology

Wireless charging device and charging method thereof

The invention relates to a wireless charging device and a charging method thereof, which are mainly used for charging electric equipment in an electromagnetic induction way by a wireless charging seat. The wireless charging sear is periodically started to judge whether the electric equipment enters an induction range or not; once the electric equipment enters the induction range, a transmission coil of the wireless charging seat transmits electromagnetic waves, a receiving coil of the electric equipment induces the electromagnetic waves to generate current and performs switching-on or switching-off according to a given built-in time sequence to relatively change the consumption current of the transmission coil in the wireless charging seat; and then the wireless charging seat judges the change time sequence of the consumption current is consistent with the built-in time sequence or not, and the transmission coil continuously charges the electric equipment if the change time sequence of the consumption current is consistent with the built-in time sequence, and stops charging the electric equipment if the change time sequence of the consumption current is inconsistent with the built-in time sequence. Therefore, the damages caused by different voltage designing of the wireless charging seat and the electric equipment are prevented, and safety in use is ensured.
Owner:KYE SYST CORP

Trusted network access and access control system and method

The invention discloses a trusted network access and access control system. The control system comprises a network access requester, a network access decision-maker and a network access controller. When the network access requester accesses to the network, platform identity authentication is carried out, and secure and trusted states of the requester are detected; the secure and trusted states are sent to the network access decision-maker, and the decision-maker judges the secure and trust level of the requester and gives a network access decision; the network access decision is sent to the network access controller, and the controller limits the requested network access. The invention further discloses a trusted network access and access control method. The control system carries out the platform identity authentication on the basis of TCM and ensures the network access control while avoids identity forging. Network areas are divided on the basis of a digital label technology and dynamically updated, network self-adaption is realized, and the access security of different logical areas is ensured. Secure and trusted strategies are configured, and combined with the TCM cryptographic algorithm, so that the security and credibility of the platform state of the requester are ensured.
Owner:SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD

Block chain-based method for accessing power Internet of Things terminal

The invention provides a Block chain-based method for accessing a power Internet of Things terminal, comprising the steps of: connecting a to-be-accessed power Internet of Things terminal to a masternode, and initiating an authentication request; the master node responding to the authentication request, and randomly selecting nodes that meet the condition of a threshold number from the block chain to form an authentication group; encrypting a public key G and an identity ID of the to-be-accessed power Internet of Things terminal by using a private key to obtain a digital signature ciphertextX, and sending the identity ID, a terminal public value R and the digital signature ciphertext X to the master node; the master node encapsulating and sending the authentication request information toa member node of the authentication group; the authentication group running PBFT consensus algorithm, and obtaining an authentication result by performing distributed authentication through two-two exchanging of the authentication information between the nodes of the authentication group; generating a new block in the block chain, and returning confirmation information to the to-be-accessed powerInternet of Things terminal; and the power Internet of Things terminal returning encrypted confirmation information to an access gateway. The block chain-based power Internet of Things terminal access method can improve the security and efficiency of authentication.
Owner:JIANGSU ELECTRIC POWER CO

Wireless network medium access control system and channel parameter regulation method

The invention discloses a wireless network media access control system and the channel parameter adjusting method of the system. The system comprises a base station and a terminal; the terminal comprises a measuring module used for measuring the downlink channel information and storing the channel information in the channel information table and a feedback module used for calculating the channel information statistical value, constructing the report message of the channel information and sending the feedback report message to the corresponding base station; the base station comprises a request module used for selecting a feedback mode, constructing the request message of the channel information and sending the request message to the terminal when the base station requests the terminal to send the current feedback channel information; the base station comprises a first adjustment module used for controlling the physical layer to adjust the downlink transmission power and a second adjustment module used for determining the power value needed to be adjusted of each terminal, storing the power adjusted value and the identification of the corresponding terminal in the uplink power adjustment table, counting the number of the terminals needed to be adjusted in power and adjusting the uplink transmission power of the corresponding terminal. The wireless network media access control system and the channel parameter adjusting method of the system make the wireless network media access control be well realized.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI

Digital public transport information publishing and cluster controlling method and device

The invention relates to a method used for digital bus information releasing and group control and a device thereof. The technical measure comprises the following steps: a vehicle terminal system, an electronic station board system and a vehicle technical information management centre are arranged, the electronic station board system is the vehicle technical information management centre are connected into a bi-directional communication network by line link, the vehicle terminal system transmits the vehicle information to the electronic station board system in a wireless communication, the electronic station board system reports the information to the vehicle technical information management centre, the bus coming to station at each station can be found out by inquiring a database, the station arriving time of the bus is calculated according to experimental data including average running speed, average running time between the stations and the like, finally, the arriving time is fed back to the electronic station board system, and the arriving time is displayed to the waiting passengers in a digital way. The method can effectively solve the problems of bus reduction in city and dispatching, information releasing, passenger facilitation, intelligent management control and the like. Therefore, the method realizes intelligent bus dispatching.
Owner:JIANGSU HANDSON INTELLIGENT TECH CO LTD

Non-cooperation game resource allocating-based 3G (the third generation telecommunication) / WLAN (wireless local area network) heterogeneous network accessing control method

ActiveCN103634848AImprove user fairnessOptimize system resource utilizationNetwork traffic/resource managementLocal area networkResource utilization
A non-cooperation game resource allocating-based 3G (the third generation telecommunication) / WLAN (wireless local area network) heterogeneous network accessing control method belongs to the technology of a wireless heterogeneous network, and solves the problems such as low network effectiveness, unbalanced resource allocation in each area and low resource utilization rate in the existing heterogeneous network resource allocating and accessing control. The method comprises the steps of establishing a 3G/WLAN non-cooperation game model to obtain an effectiveness expression of the WCDMA (wideband code division multiple access), the TD-SCDMA (time division-synchronization code division multiple access) and the CDMA (code division multiple access) 2000, solving the non-cooperation game Nash equilibrium solution of the three networks as the optimal time solution of the total network effectiveness in the whole service area and proving the uniqueness of the Nash equilibrium. The bandwidth in each covering range is obtained according to the allocating result of the CDMA, TD-SCDMA and the CDMA2000 network game sources, the rest bandwidths of the WCDMA, TD-SCDMA, the CDMA2000 and the WLAN network are computed, the accessing of a new user and the switching of the user in the network are judged and the method is suitable for the field of the wireless heterogeneous network.
Owner:HARBIN INST OF TECH

Access control method and system of self-adaptation cloud computing environment virtual security domain

ActiveCN103458003AImplement access controlImplement cross-domain access controlTransmissionCloud computingSecurity domain
The invention relates to an access control method and system of a self-adaptation cloud computing environment virtual security domain. The access control method of the self-adaptation cloud computing environment virtual security domain comprises the steps of (1) deploying a virtual security gateway device on a virtual machine management layer, carrying out interaction with a cloud security policy sync center in a cloud computing environment through the virtual security gateway device to obtain security policy information, monitoring a network communication behavior of a virtual machine on the virtual machine management layer according to a security policy, directly carrying out access control on network communication data packets inside the same physical machine, and (2) adding a security control packet to a network communication data packet across the physical machine, and carrying out self-adaptation access control across the physical machine through the security control packet and a security feedback packet which contains access control policy dynamic-adjustment information. The access control method and system of the self-adaptation cloud computing environment virtual security domain can achieve the function of carrying out fine-grained access control on communication among different virtual machines on the same physical machine or different physical machines, an access control policy can be adjusted in a dynamic mode, and access control over the self-adaptation cloud computing environment virtual security domain can be achieved.
Owner:CEC CYBERSPACE GREAT WALL

System and method for multilevel cross-domain access control

The invention relates to a system and method for multilevel cross-domain access control in case of a multilevel administrative domain. The cross-domain access control is realized through a multilevel-role-based mapping mechanism; the method is realized based on all cross-domain access centers deployed in the entire country and provincial levels; the cross-domain access centers provide cross-domain role application and query services; and administrators can administrate all cross-domain access centers. The method comprises two steps of authorizing the cross-domain access control and carrying out access control on cross-domain access behaviors of users according to the authorization, wherein the authorizing of the cross-domain access control comprises the step of establishing corresponding cross-domain roles in related cross-domain access centers, and the control on user access comprises the steps of obtaining the access authority of cross-domain subjects to objects according to the mapping relationship between the cross-domain roles and domains where the subjects and the objects are located, and carrying out control by the domains where the objects are located. The system and the method are used for administrating the cross-domain access of three levels, i.e. a national level, a provincial level and a municipal level, in a security service platform, so that the cross-domain access control has the characteristics of self-government administration, user transparency and convenience in extension.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

System, device, and method for implementing radio resource management in multi-standard communication network

The embodiment of the invention discloses a system for achieving wireless resource management in a multi-system communication network and a method thereof. The system provided by the embodiment of the invention comprises a wireless resource management unit and a CRRM unit of a plurality of different single systems, wherein, the wireless resource management unit is used for reporting wireless resource information of each single system communication network to the CRRM unit and the CRRM unit is used for centralized management of wireless resources of the multi-system communication network on the basis of the wireless resource information. According to the provided proposal of each embodiment of the invention, the centralized management of wireless resources of the multi-system communication network is achieved by introducing the CRRM unit to the multi-system communication network; loading conditions and system operation state of the multi-system communication network can be completely controlled; real-time control and integrated optimization of the wireless resources of the multi-system communication network can be realized, thus making the best use of the wireless resources of the multi-system communication network and protecting investment of operators.
Owner:HUAWEI TECH CO LTD

Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph

The invention discloses a deterministic cloud data deleting method based on sampling and fragmenting of a cryptograph. The method mainly solves the problems that the fine granularity of access control is low and the safety is low in the prior art. The method comprises implementation steps that (1) a data owner carries out sampling and fragmenting on the cryptograph to generate a sampling cryptograph and a residual cryptograph, and the sampling cryptograph and the residual cryptograph are sent to a credible third-party mechanism and a could service provider respectively; (2) a file secret key is shared by a plurality of users in a cloud storage environment; (3) when an authorized user accesses the cloud data, the credible third-party mechanism merges the cryptograph of a file, and the authorized user decrypts the cryptograph of the file; (4) the cryptograph sampling and fragmenting technology is adopted to prevent the cloud service provider from acquiring the integrated cryptograph of the file, the credible third-party mechanism destroys the sampling cryptograph, and then deterministic data deleting is achieved. By means of the method, real-time deterministic deleting of data in cloud storage services can be achieved, and the privacy of user data can be improved. The method can be used for guaranteeing safe access of the user data in the cloud storage mode.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products