Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

38results about How to "Support diversity" patented technology

Application program executing permission control method used for operating system

The the invention discloses an application program executing permission control method used for an operating system. The method includes the following steps: classifying application programs in the operating system; establishing an executing permission control strategy of the application programs; when the application programs execute requests, checking classifying marks of the application programs, verifying completeness of the application programs if the classifying marks allow all users to execute or are protected and are tampering-proof, executing if verification passes, and refusing to execute if verification fails; if the classifying marks allow or refuse part of users to execute, inquiring the executing permission control strategy on the basis of inherent information of the application programs, executing if the executing permission control strategy returned by inquiring allows the application programs to be executed, and refusing to execute if not; if the classifying marks are empty or refuse all users to execute, refusing toe execute the application programs. The application program executing permission control method has the advantages of high malicious software preventing capability, safety, reliability, high stability, high universality and high expandability.
Owner:NAT UNIV OF DEFENSE TECH

Loose coupling role authorized-type implementation access control method and system thereof

The invention discloses a loose coupling role authorized-type implementation access control method and a system thereof. The method comprises the following steps of: adding a user role incidence relation based on a type implementation access control method; adding a related process type transformation rule definition relating to a user role and a corresponding type transformation decision mechanism; when a system process type is transformed, according to the process type transformation rule, judging whether to perform role related type transformation according to a current role of the user to change a user process execution flow; and entering a specific security domain of the user role. The system comprises a type implementation access control policy module, a policy security configuration module and a policy rule configuration module, wherein the type implementation access control policy module is operated in the kernel of an operating system; the policy security configuration module is operated on the user layer of the operating system; and the policy rule configuration module is positioned in a file system. The method and the system have the advantages of reducing the influence of user role configuration change on a type implementation rule system, reducing the security configuration difficulties, facilitating flexible configuration according to actual service conditions.
Owner:NAT UNIV OF DEFENSE TECH

A computer vision-based mobile application testing system and method

The present invention discloses a computer vision based mobile terminal application testing system and method. The system comprises an image script test module and an automatic test module. The image script test module obtains screen images and screen information simultaneously, reads a template image in a script and information in the template image, and executes a template matching algorithm; if the match is successful, an image matching result is returned, and if the match fails, a feature point matching algorithm is executed; and if the match is successful, the image matching result is returned, and if the matching fails, failure codes are returned. The automatic test module obtains an original image, calculates a saliency grayscale image of the original image by using a saliency detection algorithm, converts the saliency image into a binary image, and applies a random algorithm or a K-means algorithm to the saliency binary image to determine a saliency point set to automatically finish clicking and recording. The system and the method disclosed by the present invention improve test efficiency, are applicable to a wide variety of mobile devices, and greatly reduce the learning cost and provide test convenience for a tester by using two manners of a given script and full-automation.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Charging communication protocol framework for electric vehicle and off-board charger and implementation method thereof

The invention discloses a charging communication protocol framework for an electric vehicle and an off-board charger and an implementation method thereof. The charging communication protocol framework comprises a plurality of ordered function modules: version negotiation, function negotiation, parameter configuration, authentication, reservation, charging system self-inspection, pre-charging and energy transmission, and charging ending; the charging communication protocol is composed of all necessary function modules and zero or more optional function modules in the framework, and supports one or more application examples of the function modules capable of being reloaded at the same time; different versions of communication protocols can support different option function modules and different application examples of reloading function modules; the vehicle/charger following a certain specific version of communication protocol can realize all/part of functions supported by the version of communication protocol according to own realization conditions and requirements; through version negotiation, function negotiation and flexible configuration of the selectable function module and the reloaded function module, the requirements of the charging communication protocol for compatibility, expansibility and flexibility are met.
Owner:STATE GRID ELECTRIC POWER RES INST +1

Hardware fault-oriented method and device for correcting faults in key files of system

The invention discloses a hardware fault-oriented method and a hardware fault-oriented device for correcting faults in key files of a system. The method comprises the following steps: (1), establishing a backup file table which contains information of the key files of the system, establishing a copy file for each target file of the backup file table and maintaining synchronization of the copy files and the target files; (2), detecting file operation fault of an operating system in real time and diagnosing the reason of the fault, when the file confronting the operation fault is the target file corresponding to the backup file table and the fault is caused by hardware fault of a storage system, carrying out next step; and (3), replacing the file encountering the operation fault with the corresponding copy file and trying to operate the file again. The device comprises a copy file managing module, a fault detecting module, a fault diagnosing module and a fault processing module. According to the method and the device, the problem of system down or service crash caused by file access failure can be prevented; and the method and the device have the advantages of good fault tolerance characteristic, high robustness, real-time fault recovery, transparency to user, strong expandability and good commonality.
Owner:NAT UNIV OF DEFENSE TECH +1

A Method of User Authorization on Demand Supporting Least Privilege

The invention discloses a user on-demand authorization method capable of supporting least privilege. The method comprises the following implementation steps: establishing a plurality of roles in an operating system, and setting a verification password for each role; defining different permission classes needed by running of different application programs as different permission types; associating a user with the corresponding role and the corresponding permission type of the role during login, wherein role conversion or permission type conversion can be carried out according to program requirements; finally extracting the current role and the permission type information of the user, judging whether a program requested by the user is allowed to be executed or not on the basis of the current role and the permission type of the user, if yes, executing the program requested by the user, and otherwise, prohibiting executing the program requested by the user. According to the method, authorization can be carried out according to actual permission requirements of different applications, the applications only have associated permissions to complete normal functions when the user executes the applications, the safety is guaranteed, the usability of the system is improved, the generality is high, and the application range is wide.
Owner:NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products