Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

37results about How to "Implement authorization" patented technology

Intelligent stamp cloud management system and stamp use content abnormality identification and control method

The present invention provides an intelligent stamp cloud management system and a stamp use content abnormality identification and control method. The system comprises a cloud management server, cloud smart stamp terminals and cloud management clients; the cloud smart stamp terminals send stamping information and stamped document pictures to the cloud management server for storing the stamping information and the stamped document pictures, and generate search codes; the cloud management clients are used for document stamping application, inquiry, approval and warning and upload original documents which people apply for stamping the cloud management server through a cloud network; and the cloud management server is used for verifying the authenticity of stamped documents and sending verification results to the cloud management clients. According to the intelligent stamp cloud management system and the stamp use content abnormality identification and control method of the invention, the cloud management server of stamps is connected with the cloud smart stamp terminals with intelligent functions and network functions, and the cloud management clients, and therefore, stamp control cloud-based intellectualization and control flow integrity can be realized, and the problems of incomplete management flow monitoring and high control risk caused by the blind zones of a traditional stamp management flow can be solved.
Owner:童迎伟

Multifunctional electronic pen and software authorization method thereof

The invention discloses a multifunctional electronic pen and a software authorization method thereof. The electronic pen comprises a pen body and a pen refill part which is arranged in the pen body, wherein the pen refill part comprises a writing pen refill and an electronic pen refill; a writing end of the writing pen refill is arranged in a pen nib at the lower end of the pen body; the electronic pen refill comprises a power system, a data processing module, a function control system, a clock chip, a card read-write system and a fingerprint acquisition processing system and a wired or wireless connection device; the power system and the data processing module are arranged in the pen body; the function control system, the clock chip and the card read-write system are connected with the data processing module; the fingerprint acquisition processing system is arranged on the central section of the pen body; and the wired or wireless connection device is arranged at the rear end of the pen body. The electronic pen can be used for writing electronically, can realize ink writing, can carry out recording and storage in the process of electronic writing, can add identity identifiers and time identifiers into writing tracks in storage process, and can effectively guarantee personal intellectual products by combining the software authorization method of the multifunctional electronic pen.
Owner:王东

Method and system for intensively operating and controlling several network security devices

The invention relates to a method and a system for intensively operating and controlling several network security devices. An access control module is connected with an operation login interface, a resource account management module is connected with an operation channel module, and an online monitoring module and an operation content audit module are connected with a system resource agency operation module. The method includes starting remote operation security device requests, and acquiring remote management passwords of the security devices from a password bank; converting the operation requests into original device operation commands, and letting system agencies log in; analyzing original data packets of operation into original commands, recording the original commands of the operation to realize audit. The method and the system for intensively operating and controlling the network security devices have the advantages that the system adopts the security operation control and audit technology to set up a centralized operation portal, for operation of the heterogeneous network system, intensive multi-identity verification, authorized access control, remote control, monitoring and recording of operation behaviors are realized, and rule-breaking operations are stopped.

Identity authentication method and device based on security chip, and medium

The invention discloses an identity authentication method based on a security chip, which comprises the following steps: acquiring user password information, and calling an encryption and decryption algorithm of the security chip by a security manager to encrypt the user password information; storing the encrypted user password information into a security chip through a password storage interface;in response to the user login request, acquiring user permission information by the security manager, and comparing the user permission information with the user password information for judgment; and in response to matching of the user permission information and the user password information, confirming that identity authentication is passed. The invention further discloses a computer device anda readable storage medium. According to the identity authentication method and device based on the security chip and the medium, basic security services are provided for a system platform and software by using the security chip, a safer and more reliable system platform environment is established, and the functions of identity authentication, authorization, encryption, session management and thelike of an application program are further achieved.
Owner:SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD

Seal protection box and application method of seal protection box

The invention discloses a seal protection box and an application method of the seal protection box. The seal protection box comprises a shell body, a top wall, a bottom wall and at least two upper covers, wherein a fingerprint identifier is arranged at the first side of the top wall; the shell body is internally provided with a cavity; the cavity is internally provided with a wireless communication module, a GPS (Global Positioning System) positioning module and a locking device; the GPS positioning module, the fingerprint identifier and the locking device are communicated with a background server through the wireless communication module; a containing cavity is formed between one upper cover and the shell body; an opening is formed above the containing cavity and the upper cover covers the opening of the containing cavity. According to the application method disclosed by the invention, the seal protection box is authorized to use. The seal protection box disclosed by the invention canbe used for conveniently and effectively realizing utilization authorization of a seal, and accurate tracking of a seal position, supervision, authorized utilization and safekeeping can be realized;the risks that the seal is stolen and abused are reduced; the safety management of the plurality of seals can be realized at the same time.
Owner:珠海实跃科技有限公司

Distributed digital rights management (DRM) system based on blockchain

The invention relates to a distributed digital rights management (DRM) system based on a blockchain. The method belongs to the technical field of digital copyright protection and the technical field of blockchain. The system comprises a blockchain network supporting an intelligent contract, a distributed public account book, a content publisher, a content consumer account, a DRM content encryptionmodule, a DRM content authorization module, a DRM agent module, a DRM content authorization intelligent contract, a DRM content playing device, a content distribution platform and the like. The blockchain distributed public account book records the content copyright information and the content license of the encrypted digital content besides recording the account state, the transfer transaction,the smart contract code and the like, and the content copyright information and the content license both contain protected content encryption keys. Content encryption keys of digital content and content licenses authorized to consumers by content publishers are safely managed on blockchain, content copyright management is open and transparent, and DRM content authorization can be directly carriedout between any content publisher and the consumers in a point-to-point mode on the Internet through the system.
Owner:北京子辰飞马科技有限公司

Portable intelligent gun box device

PendingCN106597926AAdd address IDAdd low power designProgramme controlComputer controlIdentity recognitionComputer science
The invention discloses a portable intelligent gun box device, which comprises a power module circuit, an ARM processor platform and a fingerprint acquisition module circuit, wherein the power module circuit is connected onto power ends of the ARM processor platform, the fingerprint acquisition module circuit, a GPS&GPRS module circuit and a peripheral module circuit for providing power; and the CAMER interface of the ARM processor platform is connected with the fingerprint acquisition module circuit for fingerprint extraction and comparison, and only an authorized legal user can open the gun box. The fact that the fingerprint for the identity of a gun-taking person is quickly compared and the gun box is legally opened can be realized, remote increased and decreased authorization on the identity of the gun-taking person can be realized, the fact that each gun box has a global unique ID series number can be realized, and the uniqueness of each gun box is ensured; the fact that the position unlocking information and the unlocking time of the gun-taking person are recorded to the gun box device for facilitating query is realized; the portable intelligent gun box device is applicable to military and public security exercises for realizing quick gun-taking person identity recognition, remote monitoring and real-time authorization; and due to records of the gun-taking person identity information, the time and the space, supervision by a relevant department is facilitated.
Owner:CHANGCHUN HONGDA OPTOELECTRONICS & BIOSTATISTICS IDENTIFICATION TECH

System and method for telephone permit work ticket management and control

A telephone license operation order management and control system is characterized by comprising an operation and maintenance center server, an intelligent lock control host, a computer key, and transformer station access control locksets. The operation and maintenance center server is in communication connection with intelligent lock control host via wireless network; the computer key matches with the intelligent lock control host; the computer key conducts wireless communication with the intelligent lock control host through the communication module; unlock permission of each access control and corresponding RFID coding of an RFID chip in the lock are stored in the intelligent lock control host; and the computer key reads the RFID coding in the transformer station access control mechanical lockset, and opens the lockset in each transformer station access. The system can effectively solve the problem of incapability of telephone license operation order management and control in the previous work; after using the system, the process of remote licensing and operation order termination by maintenance personnel is standardized, and the action area of maintenance personnel in the work process is strictly controlled, so as to lay a good foundation for safe power production.
Owner:STATE GRID CORP OF CHINA +1

Method and device for realizing on-demand authorization of CAS terminal

The invention discloses a method for realizing on-demand authorization of a CAS terminal, and the method comprises the steps: receiving an authorization request sent by the CAS terminal, and obtaining a CAS terminal identifier corresponding to the authorization request; determining authorization information corresponding to the CAS terminal identifier according to the CAS terminal identifier; sending the authorization information to the CAS terminal sending the authorization request through a preset hypertext transfer protocol (http) interface, wherein the authorization information comprises an encrypted service secret key, so that the CAS terminal obtains a control word according to the service secret key, and the received scrambled program stream is descrambled according to the control word. The invention also discloses a device for realizing on-demand authorization of the CAS terminal and a computer readable storage medium. According to the invention, the authorization request sent by the CAS terminal is received, and then the authorization information is sent to the CAS terminal in a unicast manner, so that the problem that the authorization information occupies a large amount of bandwidth when the authorization information is broadcasted to all the CAS terminals in a one-way manner is solved.
Owner:SHENZHEN SDMC TECH CO LTD

Authorization method and device, authorization platform and storage medium

The embodiment of the invention relates to an authorization method and device, an authorization platform and a storage medium. The method comprises the steps that a first authorization request of a bastion host is received through an authorization platform, wherein the authorization request comprises a unique identifier of the bastion host and information of an authorization range; the authorization platform sends the first authorization request of the bastion host to an authorization server, so that the authorization server performs authorization verification based on the unique identifier of the bastion host and the information of the authorization range; and then the authorization platform receives an authorization notification returned by the authorization server after the authorization verification is passed and sends the authorization notification to the bastion host. According to the scheme provided by the invention, the bastion host and the authorization server under different networks are linked by setting the authorization platform capable of communicating with the bastion host and the authorization server under different networks, so that authorization and unified management of the bastion host under different network environments are realized, and the flexibility and security of authorization management are improved.
Owner:BEIJING TOPSEC NETWORK SECURITY TECH +2

A blockchain-based distributed digital rights management (drm) system

The present invention relates to a blockchain-based distributed digital rights management (DRM) system. It belongs to the field of digital copyright protection technology and the field of block chain technology. The system of the present invention includes a blockchain network supporting smart contracts, a distributed public ledger, content publishers and content consumer accounts, a DRM content encryption module, a DRM content authorization module, a DRM agent module, a DRM content authorization smart contract, and a DRM content playback equipment, and content distribution platforms, etc. In addition to recording account status, transfer transactions and smart contract codes, the blockchain distributed public ledger also records content copyright information and content licenses of encrypted digital content. Both content copyright information and content licenses contain protected Content encryption key. The secure management of the content encryption key of the digital content and the content license authorized by the content publisher to the consumer on the block chain is realized, and the content copyright management is open and transparent. DRM content authorization can be carried out point-to-point directly.
Owner:北京子辰飞马科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products