Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

92results about How to "Implement permission control" patented technology

Cheating prevention electronic weighing apparatus calibrating system and method

The invention relates to cheating prevention electronic weighing apparatus calibrating system and method. The calibrating system comprises an electronic weighing apparatus, an electronic weighing apparatus calibrating device and a metering supervisory management platform, wherein the metering supervisory management platform comprises an electronic weighing apparatus, a calibrating device, databases comprising various identity information and operating information of a calibrating staff and a computer or a server for carrying the databases, and establishes direct or indirect data communication link by a network and the calibrating device. The system is provided with a card swiping unit and an authenticating unit, a calibrating mode of the traditional electronic weighing apparatus can be changed, the calibrating operation is transmitted to the calibrating device to be carried out so as to ensure the electronic weighing apparatus can not independently finish the calibrating program, which enhances the safety and reliability of calibration and effectively prevents illegal calibration, thereby effectively preventing a behavior for cheating on the electronic weighing apparatus by the illegal calibration on the electronic weighing apparatus.
Owner:CHENGDU JIUZHOU ELECTRONIC INFORMATION SYSTEM CO LTD

Method and system of Web for accessing Docker container

The invention discloses a method and a system of a Web for accessing a Docker container, and belongs to the technical field of cloud computing. The technical problems needing to be solved are that an independent SSH service for remote login and access still needs to be built for the Web to access the Docker container remotely, configuration of parameters such as a user name and a password is needed, and the remote access process is tedious. By adoption of the technical scheme, the method comprises the steps of finding a to-be-accessed Docker container at a Web page and initiating an access request by a user; judging user authority by an access support assembly; if the user has the authority, building a token for Docker container access and returning the token to the user; by the access support assembly, obtaining the ID of the Docker container and the IP address of a host machine where the Docker container is, and generating an URL address of the Docker container interface; verifying the token by a Web access assembly, and building Websocket connection through the URL address of the Docker container interface if the token passes the verification; and opening the Web page containing a console terminal of the Docker container through the Web access assembly. The method and the system of the Web for accessing the Docker container can still realize authority control on Docker container access without enabling an sshd course.
Owner:SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD

Account system setting method and system, computer device and storage medium

The invention relates to the field of account management, in particular to an account system setting method and system, a computer device and a storage medium. The method comprises: setting up a distributed fabric network structure, invoking the password original cryptogen utility, generating the certificate and key, generating a primary user after the super administrator certificate is bound to the first user, wherein the primary user has the new service permission, the query service permission and the permission to create the secondary user; calling the root certificate to issue the user certificate, and binding the user certificate with the user to generate the secondary user, wherein the secondary user has the new service permission and the query service permission. The Fabric networkstructure of the invention provides policy services such as identity service, access control, authorization management and the like for the block chain network, wherein the secondary users can be registered and registered by the primary users, which ensures the relevance between the users. The secondary users can further refine the functions to avoid the excessive exposure of the primary users, realize the control of the account authority, and ensure the security of the account.
Owner:PING AN TECH (SHENZHEN) CO LTD

Multi-user remote parallel computation system

ActiveCN102646223ASolve the conflict problem of concurrent operationImplement permission controlResourcesTransmissionWeb servicePower system scheduling
The invention belongs to the field of power systems, and particularly relates to a multi-user remote parallel computation system. The multi-user remote parallel computation system comprises a WEB server, an application server, a database server, a parallel computer group and network connection switching equipment, wherein the WEB server, the application server, the database server and the parallel computer group are respectively connected with the network connection switching equipment. According to the technical scheme provided by the invention, the design scheme that the software system adopts 'concentrated storage, data sharing, remote maintenance, cooperation and component integration' as the predominant idea while meeting the requirements of 'practicability, modularization, integrity and expandability' is determined, and the requirements of the mode calculation of the power system on functions and performances of a computer software system and the need for relatively flexible updating and maintenance of the system are comprehensively considered. According to the multi-user remote parallel computation system provided by the utility model, the reliability and the mode calculation working efficiency of power grid data are comprehensively improved.
Owner:CHINA ELECTRIC POWER RES INST +1

System and method for realizing data authority control based on metadata in big data environment

The invention relates to a system for realizing data authority control based on metadata in a big data environment. The system comprises: a metadata management module used for acquiring metadata information in the big data environment from different databases through a built-in adapter; a authority configuration module which is used for configuring authority marks of metadata for different roles;and an authority service module which is used for generating an authority service interface according to the stored authority information and providing authority authentication service to the outside.The invention further relates to a method for realizing metadata-based data permission control in the big data environment. The system and the method for realizing data authority control based on metadata in the big data environment are adopted; the problem of data permission control of different types of databases is solved, meanwhile, a large amount of encoding time for data acquisition is saved, the complexity of data permission control is reduced, the problems that cross-system data permission control cannot be performed and the permission control process cannot be effectively monitored at present are solved, and unified control of data permission is realized.
Owner:PRIMETON INFORMATION TECH

Multi-level role permission control method and device based on cryptography

The invention provides a multi-level role permission control method and device based on cryptography, electronic equipment and a storable medium. The method comprises the following steps: dividing a role superior-subordinate relationship according to a service permission demand; controlling the access permission in the spatial dimension through the key encryption and decryption permission; whereina part of roles have verification permission, single original text information needing to be verified is sent to a verification party by a verified party (data input party) or a management party (highest permission party), the verification party performs hash operation on the original text information to obtain a hash head, the hash head is compared with the hash head of the encrypted informationobtained by the verification party, and if the two hash heads are consistent, the verification content is not tampered. The method is suitable for various access permission and verification permission requirements in the space dimension and the time dimension, extremely complex service requirements in real life can also be flexibly realized through simple configuration, and the development cost and the maintenance cost of a permission system are greatly reduced. Based on the cryptography technology, the permission is determined through the secret key, and high safety and stability are achieved.
Owner:杭州城市大数据运营有限公司 +2

Medical data management system based on double block chains and patient authorized medical record sharing method

PendingCN113764060ADefend against attackAvoid the risk of medical disputesDatabase distribution/replicationDigital data protectionMedical emergencyIn patient
The invention discloses a medical data management system based on double block chains and a patient authorized medical record sharing method, and relates to the technical field of authenticated key negotiation algorithms. The medical data management system comprises a medical block chain, a supervision block chain, a medical record storage end, a medical record access control endfor sending medical record access authorization to a medical record request end and calling an intelligent contract to store health records containing medical record keywords, and a medical record request end which is used for acquiring active authorization and requesting data from the medical record storage end when the patient is awake and calling the intelligent contract to search the health record matched with the fingerprint of the patient when the patient is coma so as to request data from the medical record storage end. According to the system and the method, a graded workload proof consensus mechanism is adopted, the speed of generating the new block is changed according to the emergency degree of the transaction, a double-chain structure is used for supervising the data on the chain, and privately mining attacks are effectively resisted.
Owner:ANHUI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products