Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

87results about How to "Implement rights management" patented technology

Container technology-based memory access method and system

InactiveCN107301022AUnified connectivityUnified accessInput/output to record carriersTransmissionContainerizationAccess method
Embodiments of the invention relate to the field of cloud storage, in particular to a container technology-based memory access method and system. The system comprises a volume management module, a memory drive management module, an authority management module and a container arrangement module; wherein the volume management module is used for sending a volume creation request by a user through an interface or an API so as to realize the creation of different types of volumes, and managing the created volumes; the memory drive management module is used for receiving the volume creation request sent by the volume management module; the authority management module is used for calling an interface of Keystone so as to realize the authentication and authority management of the user; the container arrangement module is used for operating each memory drive at a corresponding calculation node in a container manner; the memory drives provide configuration files aiming at different arrangement frames; and the arrangement module calls APIs of the arrangement frames to realize the containerization and scheduling of each memory drive. According to the method and system, the high availability and load balance of each memory drive are realized.
Owner:北京溢思得瑞智能科技研究院有限公司 +1

Data access method, access verification device and data storage system

The invention discloses a data access method, an access verification device and a data storage system. The data access method is applied to the access verification device, the access verification device has a preset license chain, permissions are respectively set for data and a user on the license chain, and the permissions are characterized by the type and number of tokens. The method comprises the following steps: querying the access permission of the user on the preset license chain in response to a data access request sent by the user through a client, wherein the access permission is characterized by the type and number of tokens; generating data access information based on the type and number of tokens in the access permission; and sending the data access information to the client, so that the client accesses the data in the data storage system based on the data access information.
Owner:湖南岳麓山数据科学与技术研究院有限公司

Method and terminal for setting permission of application and controlling restricted region

The invention discloses a method and terminal for setting permission of an application and controlling a restricted region. The method disclosed by the invention comprises the following steps of: establishing bidirectional communication in advance by virtue of a region identification code and a region server, receiving an encapsulation application sent by the region server, and generating a human-computer interaction interface corresponding to a member identification code according to the encapsulation application and authority association between the member identification code of each member of multiple members and corresponding operating authorization; calling the corresponding human-computer interaction interface according to the member identification code input by the user, and controlling the region mobile terminal and/or controlled equipment of an icon identification in the human-computer interaction interface; or calling the encapsulation application of the icon identification in the human-computer interaction interface and controlling the region mobile terminal and/or controlled equipment corresponding to the encapsulation application. Communication is established by virtue of the region identification code and the restricted region while the encapsulation application is synchronized, and further authority association stored locally is combined, so that authority management for controlling the terminals in the restricted region by multiple users is realized.
Owner:周万荣

A method and system for uniformly processing heterogeneous data sources

The invention discloses a method and system for uniformly processing heterogeneous data sources. The method comprises the following steps of acquiring request end data; obtaining user information through the request end data and authenticating a user; analyzing the request end data, and determining a target database of the request end data; converting the request end data into a dialect corresponding to a target database; establishing a connection with the target database, executing the request end data through the converted dialect, and returning an execution result to the request end. The system comprises a data acquisition module, a data analysis module, an authority configuration module, a route analysis module, a grammar conversion module and an execution module. The method is based on MySql binary communication protocol communication. By converting the standard Sql statement into the target database dialect, the purpose of operating different types of databases and returning databy taking the unified Sql92 standard statement as an inlet is achieved, the implementation cost and the technical difficulty of cross-database heterogeneous data source unified processing are effectively reduced, and the efficiency of heterogeneous data source unified processing is improved.
Owner:CHENGDU SEFON SOFTWARE CO LTD

Permission management method and device based on intelligent contract

The invention provides a permission management method and device based on an intelligent contract. The method comprises the steps of obtaining a subject identifier, an object identifier and an operation relation between a subject and an object; according to the subject identifier, the object identifier and the operation relation, generating a unique permission storage identifier; and performing operation on permission control content information of the subject or the object according to the permission storage identifier. A data structure and the permission management method used by a Key-Valuedatabase are completed in the intelligent contract, and are not limited to a certain type of block chain technology. The method can be efficiently decoupled from the control of block chain nodes andthe like, is decoupled from a service model, realizes the permission management of small unit capacity, and does not depend on other systems. For a data storage model and unit capacity limitation of ablock chain, the operations of adding, modifying, querying, deleting and the like of existing block chain data are adapted, the permission management complexity of service requirements is met, and the requirements of the performance of usage experience and the like are met.
Owner:苏州朗润创新知识产权运营有限公司

Intelligent sewage treatment device and method

The invention provides an intelligent sewage treatment device and method. The device comprises a container, as well as a mixing tank, a supermagnetic sewage purification box, a first water tank, an activated carbon filter device, a second water tank, a nano ultrafiltration device, a third water tank, a PAM addition device, a PAC addition device, an ammonia-nitrogen-free drug addition device, an activated carbon cleaning device, a disinfectant addition device, an ultrafiltration cleaning device, a water suction pump, a magnetic seed recovery device, a desliming device and an electric control cabinet which are located in the container. By adopting a supermagnetic separation and purification technology and container installation, the floor area is saved and transportation is convenient; remote maintenance and data monitoring of the intelligent sewage treatment device are achieved through a cloud server; wiring is not needed, a distance limit is avoided, only a mobile phone signal is needed, and a master-slave limit is avoided; data exchange of various modes, such as a one-to-many mode, a many-to-one mode and a many-to-many mode is achieved; and fault maintenance of maintenance personnel can be achieved at any place, and thus the operation cost is reduced.
Owner:BEIJING AREOSTANARD NEW TECH +1

Excavator one-key start control device and method

The invention provides an excavator one-key start control device and method. The control device comprises a master controller, a guide handle, a guide pedal, an electronic monitor, a fingerprint identification module, a GPS controller, a GPS management platform, a mobile communication platform, a mobile phone client side, a one-key start module, a start relay, a guide safety handle, an engine controller and an emergency stop switch. A start key conventionally adopted in the prior art is saved through simplification, auxiliary start devices such as radio frequency are not needed, the inconvenience factor caused by the fact that a user forgets to carry an induction device is avoided, meanwhile, a one-vehicle one-key purpose is convenient to achieve, authorization control of a start system can be guaranteed under the condition that the one-vehicle one-key condition is guaranteed, start and operation authority management of excavator equipment can be achieved through combination with the latest fingerprint identification technology, the safety management level of a machine is improved, potential safety hazards generated by non-active control such as a secondary start and a mistaken stall are effectively prevented, and the operability and safety of the machine are effectively improved.
Owner:XCMG EXCAVATOR MACHINERY

Authority management method and apparatus

The present disclosure relates to an authority management method and apparatus, including obtaining authorization information from a received authorization SQL statement; adding a right record generated according to the authorization information to a column right data table of a metadata database when the authorization information includes a column identifier, and adding a right record generated according to the authorization information to a table right data table of the metadata database when the authorization information does not include a column identifier; when the access SQL statement isreceived, table-level authority verification being performed on the access SQL statement according to the authority record in the table authority data table, and column-level authority verification being performed on the access SQL statement according to the authority record in the column authority data table when the table-level authority verification is not passed. By performing permission verification according to the column-level permission data table and the table-level permission data table, the right management method and the device according to the disclosed embodiment can realize fine-grained right management in SparkSQL.
Owner:NEW H3C BIG DATA TECH CO LTD

Wireless linkage and controlling method and system

The invention discloses a wireless linkage and controlling method, and the method comprises the steps: sensing and controlling trigger equipment or trigger event and sensing and controlling equipment associated information is added in the linkage information, and system main control equipment writes the linkage information in a wireless linkage node network; the sensing and controlling trigger equipment or trigger event makes the wireless linkage node network for storing the linkage information to acquire a trigger response through and controlling or sensing, and transmits the trigger response access information to sensing and controlling receiving equipment associated to the linkage information in a linkage sensing and controlling way or controls the working condition of the sensing and controlling receiving equipment. According to the invention, the sensing and controlling trigger equipment of the system has a dynamic access relation with the wireless linkage node network and can perform linkage information transmission and control on associated one or more sensing and controlling receiving equipment in a specific mode with preset control right, the equipment has better compatibility and flexibility than before, so that the convenience and safety of intelligent control can be improved.
Owner:SHENZHEN ALM SOUND TECH CO LTD

Industrial service authority management method and device, and machine tool equipment

The invention provides an industrial service authority management method and device, and machine tool equipment. The method comprises the following steps: acquiring information to be verified and userauthority level information that are stored in an information device; verifying the read information to be verified, wherein the information to be verified comprises one kind of device identifier information, unit identifier information or user information, or a plurality of kinds of combinations of the above information; if the information to be verified is successfully verified, permitting a user corresponding to the information to be verified to log in; detecting a service function accessed by the user during operation, wherein the service function is pre-associated with an authority parameter, and the authority parameter is provided with pre-assigned required authority level information; judging whether a user authority level is above a required authority level or not according to theuser authority level information; and permitting or rejecting use of the service function according to a judgment result. The method and device and the equipment provided by the invention have the advantages that the authority information in the information device is read through the machine tool equipment, and the various service functions corresponding to the authority information are determined through a preset authority identification mechanism for use, so that automatic authority management for the machine tool equipment is achieved.
Owner:SYMG SHANGHAI INTELLIGENCE SYST CO LTD

Permission management system based on Hue

InactiveCN107358069AFlexible allocation of permissionsFix access issuesProgram/content distribution protectionExecution for user interfacesRights managementHue
The invention relates to a permission management system based on Hue. The system comprises a permission control module, a permission relation table module and a data storage module. The permission control module is used for obtaining Hue login information, and the Hue login information refers to the Hue login information of a data analyst and at least comprises a login account; the permission relation table module is used for recording the access permissions of the login account logging in the Hue to libraries and tables and providing the permission control module with access permission information; the data storage module is used for storing data and forming the corresponding libraries and tables. According to the access permission information, the libraries and the tables which can be read by the login account are obtained by the permission control module and transmitted to the corresponding login account by the permission control module. According to the system, based on the Hue, through secondary development, the permission management system is built and used for managing the permissions of the libraries and the tables in Hive and Impala, the problem of the access permissions of different data analysts to the libraries and the tables in the Hive and the Impala is amicably solved, and the permissions of the libraries and the tables can be flexibly assigned to different users.
Owner:塞纳德(北京)信息技术有限公司

Method for controlling access authority and terminal device

The embodiment of the invention discloses a method for controlling access authority and a terminal device, which relate to the technical field of terminals, and can solve the problem that the processof selecting an application takes a long time when a user selects a required application from a plurality of applications of the terminal device. The specific scheme comprises the steps: when a firstinterface of the terminal device displays a target operation object, receiving a first input of a user to the target operation object, wherein the target operation object includes at least one first identifier, and one first identifier is used to indicate one first application; in response to the first input, modifying the access authority of each first application in at least one first application, wherein, after modifying the access authority, the access authority of each first application is permitted access and the access authority of a second application is prohibited access, and the second application is an application indicated by other identifiers other than the at least one first identifier in a plurality of identifiers on the first interface. The embodiment of the invention is applied to the process of controlling the access authority of an application in a terminal device.
Owner:VIVO MOBILE COMM CO LTD

Integrated traffic information comprehensive management and control equipment used for crossroads

The invention discloses integrated traffic information comprehensive management and control equipment used for crossroads. The equipment comprises a power supply module, a comprehensive information management and control unit, a network transmission module, an equipment box control module and a traffic signal control module; an output end of the power supply module is respectively electrically connected with the comprehensive information management and control unit, the network transmission module, the equipment box control module and the traffic signal control module; the comprehensive information management and control unit is respectively in communication connection with the network transmission module, the equipment box control module and the traffic signal control module. The highly integrated crossing traffic comprehensive management and control equipment is provided, the occupying space is small, the unified management is convenient, the operation management of a front end stand-alone system is achieved, the equipment can access to a central platform according to a communication protocol, and it is convenient for a traffic network system to manage and control a single crossroad.
Owner:深圳市交通科学技术研究所 +1

Intelligent material management device

The invention discloses an intelligent material management device which comprises hardware and software; the hardware comprises a material management platform, a material container and a material storage cabinet, and the material management platform and the material storage cabinet are connected for data transmission and exchange; a precision balance module, an RFID reader-writer module, a control module, a touch display screen module, a face recognition module, a monitoring camera module, an automatic manipulator, a human shape sensing module, a gesture recognition module, a voice recognition module, an audio playing module, an all-purpose card reader-writer module, a fingerprint recognition module and an uninterruptible power supply module are mounted on a shell of the material management platform. The intelligent automatic material management device is easy to operate, the application, the receiving, the returning and the whole storage process of materials are controlled, the operation process and the generated data information are automatically recorded and uploaded to the server, and various alarm information and processing states and results of the alarm information are automatically recorded and tracked.
Owner:上海合极数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products