Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

81results about How to "Improve authorization efficiency" patented technology

Permission allocation method and device

ActiveCN109981552AAllocation fineAppropriate distribution of authorityTransmissionDistribution methodThe Internet
The invention relates to the technical field of Internet, in particular to an authority distribution method and device, and aims to solve the problem that an authority distribution method for a systemwith a relatively complex hierarchical structure is unreasonable in the prior art. The authority distribution method provided by the embodiment of the invention is applied to a management system comprising multiple levels of management users, and comprises the following steps: when receiving a login request, determining the management level of the login user in the management system; determininga management area set and a management mechanism set corresponding to the login user according to the management level of the login user and the established corresponding relationship between each level of management user and the management area set and the management mechanism set; receiving a request of a new user, the request carrying attribute information of the new user, the attribute information at least comprising a management mechanism, a management area and authority description information; and distributing permission to the new user according to the attribute information of the newuser and the management mechanism set and the management area set corresponding to the login user.
Owner:CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1

Method and system for authenticating satellite digital on-demand services

The invention provides a method and system for authenticating satellite digital on-demand services. The method includes the steps of calling a service running supporting system after a unified authentication system receives on-demand information, verifying the user identity, the product information and the user subscription relation through the service running supporting system, generating on-demand request success information under the condition that the user identity, the product information and the user subscription relation are all correct, and generating authentication information according to the on-demand information through a digital copyright encryption system. A user inputs the on-demand information, the on-demand information is received by the unified authentication system, verified by the service running supporting system and then authenticated by the digital copyright encryption system so that authentication information can be formed, a product receiving terminal with configuration codes receives the authentication information and on-demand products according to the authentication information, the user can timely watch the on-demand products, and therefore the problems that the user can not conveniently watch the on-demand products and the utilization rate of satellite digital services is low due to the fact that no product on-demand services exist in existing satellite digital services are solved.
Owner:CHINA DBSTAR

Automatic authorization access method for database

The invention discloses an automatic authorization access method for a database. The automatic authorization access method is a method for automatically authorizing and accessing to the accessed database by an object required to be subjected to authorization access. The method comprises: step (S1), transmitting information of the accessed database as main library information; step (S2), according to the main library information, matching authorizable slave database information of a slave database corresponding to the accessed database in a preset main and slave database relation list; step (S3), according to the authorizable slave database information, executing an authorization statement in the accessed database to enable the slave database to be provided with an access right; step (S4), according to the authorizable slave database information, generating a data source accessed by the object required to be subjected to authorization access; step (S5), according to the data source, generating access configuration information accessed by the object required to be subjected to authorization access; and step (S6), according to the access configuration information, accessing to the accessed database by the object required to be subjected to authorization access.
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1

A method and equipment for generating an income report

The invention is applicable to the technical field of data processing, and provides an income report generation method and device, and the method comprises the steps: obtaining a collection voucher image about a collection voucher, and determining the collection type of the collection voucher; Identifying character information contained in the collection voucher image, generating collection information about the collection voucher, and generating a collection record of the collection voucher according to the collection information and the collection type; Acquiring a collection record auditingpath; Based on the audit order of each audit node, sequentially sending the collection record to each audit node; If authorization success information of which the auditing order is N is received, identifying the collection record as a legal collection record; And if the income statistics condition is met, generating an income report according to all legal collection records in the current statistics period. According to the invention, the collection voucher image can be converted into the collection information, and finally the income amount is counted, and the income report is generated, sothat the generation efficiency and accuracy of the income report are improved.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Authority management system

The invention provides an authority management system which comprises an application layer which comprises a unified authority management module used for unified user management, unified resource management and unified authentication management; a control layer for gathering and compiling front-end interface operation, and calling APIs of different modules according to instructions of the front-end interface operation; a database layer used for storing data; a mirror image warehouse layer used for localized storage of system service mirror images and user operation service mirror images; a storage layer which is an integrated management layer of system storage and is integrated with multiple storage types; and a cluster layer realizing arrangement and scheduling management of service applications. According to the invention, each business module is split into independent sub-services by adopting a micro-service architecture to independently provide interfaces to the outside, and the sub-services communicate with each other to complete data sharing and authority control among the cross-business modules; and a visual operation interface is adopted to configure and associate roles, users and permissions, so that the operation is convenient, and the authorization efficiency is improved.
Owner:CHINA NUCLEAR POWER OPERATION TECH +1

Method for authorizing security team of security and protection system and authorizing security team by user

The invention provides a method for authorizing a security team of a security and protection system and authorizing the security team by a user; the method includes steps of receiving a request adding information sent by a security charging terminal; according to the request adding information, judging if it is the security charging terminal; if yet, sending an authorization code to the security charging terminal so that the security charging terminal sends the authorization code to a security guard terminal; receiving the authorization code sent by the security guard terminal; according to the security team ID corresponding to the authorization code, generating a security team authorization record, and sending the confirmation information of successful authorization to the security guard terminal, and receiving the authorization request information sent by the user terminal; according to the user ID and the security system ID, generating the authorization code; sending the authorization code to the user terminal so that the user terminal sends the authorization code to the security guard terminal; receiving the authorization code sent by the security guard terminal; according to the authorization code, generating the authorization record, storing the record to the security system authorization table, and sending the confirmation information of successful authorization to the security guard terminal.
Owner:温州风暴智能科技有限公司

Method for authorizing field values of form fields through third-party fields

The invention discloses a method for authorizing field values of form fields through third-party fields. The method comprises the steps of selecting one or more authorized objects; selecting a form to be authorized, and displaying authorized fields, meeting a condition that authorization of viewing permissions of the field values of the authorized fields needs to be controlled through the third-party fields, in the form; selecting one or more third-party fields for each authorized field, wherein each third-party field comprises one or more options; and authorizing the viewing permission of the field value of the authorized field of form data corresponding to each option of each third-party field. By setting the third-party fields to limit the authorized fields needed to be subjected to the authorization of the viewing / modification permissions of the field values in the form, the viewing / modification permissions of the authorized objects can be set to be consistent with job responsibilities of the authorized objects, so that the authorized objects can be prevented from viewing / modifying form information unrelated to work of the authorized objects, and the possibility of company information leakage is reduced.
Owner:CHENGDU QIANNIUCAO INFORMATION TECH CO LTD

Blockchain face recognition campus student pickup system and blockchain face recognition campus student pickup method

The invention provides a blockchain face recognition campus student pickup system and a blockchain face recognition campus student pickup method. The blockchain face recognition campus student pickupsystem comprises a campus area, an off-campus area and a user who picks up a student, a railing and a school gate are arranged between the campus area and the off-campus area, the user is located outside the campus area, a blockchain face recognition system is arranged in the off-campus area, the user inputs and obtains information by using a student's parent user terminal or other user terminal,a cloud platform is arranged in the off-campus area, a campus internal server is arranged in the campus area, information exchange is carried out by the cloud platform and the campus internal server,a local area network switch is arranged in the campus area to distribute the information in the campus, display screens are arranged in the campus area, and the display screens are arranged in classrooms. A face recognition technology and a blockchain technology are used to ensure the safety of students in the student pickup process, and the personnel who picks up the student is recognized throughthe face recognition technology in order to improve safety.
Owner:安徽灵图壹智能科技有限公司

Ultrasonic equipment authorization method, system and device and computer storage medium

The invention discloses an ultrasonic device authorization method, system and device and a computer storage medium, and the method comprises the steps: building the connection between a target ultrasonic device and an authorization server, and obtaining the function updating information of the target ultrasonic device; sending the function updating information to an authorization server; receivingan authorization code which is sent by the authorization server and corresponds to the function updating information; and controlling the authorization process of the target ultrasonic equipment based on the authorization code. The invention provides the ultrasonic equipment authorization method. The acquired function updating information of the target ultrasonic equipment can be automatically sent to the authorization server, the authorization code which is sent by the authorization server and corresponds to the function updating information is received, the authorization process of the target ultrasonic equipment is controlled based on the authorization code, and the authorization efficiency of the ultrasonic authorization equipment can be improved. The ultrasonic equipment authorization system and equipment and the computer readable storage medium provided by the invention also solve the corresponding technical problems.
Owner:SONOSCAPE MEDICAL CORP

Authorization configuration file generation method and device, equipment and storage medium

The embodiment of the invention discloses an authorization configuration file generation method and device, equipment and a storage medium, and the method comprises the steps: determining a source code authorization mapping table which comprises a function which is allowed to be matched and has a standard function, an object type which is allowed to be operated by the function, and a mapping relation between allowed operation types; determining a security context file, wherein the security context file comprises an owner type to which the operated object allowed to be operated belongs; analyzing a to-be-authorized application program, and combining the source code authorization mapping table and the security context file through a key field identification technology to obtain each target field in an authorization syntax format; filling each target field into a corresponding position of the authorization grammar format to generate an authorization statement; and generating an authorization configuration file based on the authorization statement. By adopting the technical scheme, the purposes of automatically generating the SELinux authorization configuration file, improving the authorization efficiency and saving human resources are achieved.
Owner:SHENZHEN SKYWORTH RGB ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products