Priority safety management working method and equipment

A technology of security management and working methods, applied in the field of security authentication management for any terminal to adjust the priority, can solve the problems of incomplete authority, inconvenience, and users cannot control or operate the computer terminal, so as to maintain security and improve the security level , the effect of preventing external malicious attacks

Active Publication Date: 2017-07-14
吴平
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, computer terminals or smart terminals work relatively independently of each other, and the permissions between computer terminals or smart terminals cannot be exchanged or authorized under the same network, or the permissions are not complete, which makes users Inability to effectively control or operate computer terminals or smart terminals has caused great inconvenience to military, communication, aviation and other fields

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Priority safety management working method and equipment
  • Priority safety management working method and equipment
  • Priority safety management working method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0048] In describing the present invention, it should be understood that the terms "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", "vertical", The orientation or positional relationship indicated by "horizontal", "top", "bottom", "inner", "outer", etc. are based on the orientation or positional relationship shown in the drawings, and are only for the convenience of describing the present invention and simplifying the description, rather than Nothing indicating or implying that a referenced device or elem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a priority safety management working method and priority safety management equipment. The priority safety management working method comprises the steps of: S1, connecting an intelligent terminal and each working node via a network to form a working group, and authenticating and identifying secret keys and instructions for data transmission among the intelligent terminal and the working nodes at the intelligent terminal and each working node in the working group, thereby effectively controlling the intelligent terminal and each working node in the working group; S2, allocating one of the working nodes as a master node when executing a priority calling instruction, allocating the rest working nodes as slave nodes, and transmitting corresponding control instructions to the plurality of slave nodes by the master node; S3, and transmitting a priority calling instruction by a new master node when one node among the plurality of slave nodes is required to become the new master node, carrying out master and slave node switching through authenticating the secret keys, and controlling the rest nodes to be slave nodes by the slave node which becomes the new master node after the switching is completed, wherein the previous master node becomes one of the slave nodes.

Description

technical field [0001] The invention relates to the field of computer safety control, in particular to a safety authentication management method for adjusting priority of any terminal. Background technique [0002] In the prior art, computer terminals or smart terminals work relatively independently of each other, and the permissions between computer terminals or smart terminals cannot be exchanged or authorized under the same network, or the permissions are not complete, which makes users The inability to effectively control or operate computer terminals or smart terminals has caused great inconvenience to military, communication, aviation and other fields. This just needs those skilled in the art to solve corresponding technical problem badly. Contents of the invention [0003] The present invention aims at at least solving the technical problems existing in the prior art, and particularly innovatively proposes a security authentication management method for adjusting p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0861H04L63/0428H04L63/061H04L63/08H04L63/20
Inventor 吴平
Owner 吴平
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products