Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

284 results about "Authorization Mode" patented technology

Change the authentication mode to Windows. Windows Authentication mode provides the developer to authenticate a user based on Windows user accounts. This is the default authentication mode provided by ASP.Net. You can easily get the Identity of the user by using User.Identity.Name.

Data management system and method based on composite blockchain network

The invention relates to a data management system and method based on a composite blockchain network, wherein the system comprises a first-level blockchain network and at least one second-level blockchain network; the second-level blockchain network comprises multiple mutually connected slave node servers; the second-level blockchain network sets a master node server in all the slave node servers; and the master node servers in all the second-level blockchain networks are mutually connected, so that the first-level blockchain network is formed. By means of the data management system and method disclosed by the invention, the integrity, the authenticity and the standardization of data can be ensured through audit signature verification of the composite multi-level blockchain network; the security of the data is ensured in a hierarchical encryption and multiple authorization mode; structural design of hierarchical storage of detailed data and classified index data is carried out through a blockchain technology and the composite multi-level network; therefore, the data is relatively smooth to interconnect, intercommunicate and exchange; furthermore, audit tracing can be realized; and the data retrieving, applying and sharing efficiency can be increased.
Owner:黑龙江卓亚科技有限公司

Access control method and system based on block chain technology

ActiveCN108123936AResistance to failureResist being attackedFinancePayment protocolsAuthorization ModeData privacy protection
The invention provides an access control method and system based on block chain technology. The block chain technology is combined with attribute-based access control in the method, and the method comprises the following steps: adding an object in a chain, binding a judgment process of attribute and strategy on all block chain nodes with reference to the strategy. The access authorization is converted from a centralized manner into a distributed manner, the consistency check of the judgment results in the whole network is achieved by using a consensus mechanism of the block chain, and the authorized operations for accessing the recorded transactions are permanently recorded on the block chain. The method has the advantages of anti-single point failure, flexible authorization mode, accurateaccess boundary, and record auditability. The access control method and system provided by the invention are applicable to operating environments such as enterprises and governments that have the need of data privacy protection and realize multi-branch cooperation work based on a block chain platform, the access permissions of users in the system can be dynamically and scalably managed, fine-grained permission management is achieved for the strategy and the attribute, and the access control method and system are of important practical significance for protecting the security of information systems in a distributed network environment.
Owner:UNIV OF SCI & TECH BEIJING

Software authorization system based on public key cryptosystem

The invention discloses a software authorization system based on public key cryptosystem. The software authorization system comprises a server end and a client end, wherein the server end comprises an institution authorization certification generation module, a receiving module, a verification module and a user authorization certificate generation module. The user authorization certificate generation module comprises a digital signing module used for carrying out digital signing on computer hardware characteristics h0 in a user registration file with an RSA private key to generate S0, an encryption string generation module used for carrying out preset hybrid operations on obtained software version information v, user information u, an authorization term ex, current time cur and s0 to generate an encryption string signB64 and a certificate generation module used for generating a user authorization certificate with the encryption string signB64 and the RSA public key. The method can prevent software from being illegally copied, meanwhile, the software can be managed by a software issuer in a concentrated mode, and upgrading and tracking of the software, pushing personalized services for users and other after-sale management are facilitated.
Owner:HUAZHONG NORMAL UNIV

Intelligent control device system for mineral material transportation and sale flow and system application method

The invention discloses a combined control device system for material storage goods yard transportation and sale and a system application method. The system comprises an information inputting module, a loading control module, a weighing control module, a payment control module, an exit control module, a background storage module, a management control module and an information inquiry module which are mutually connected; and the system consists of hardware and software. The method comprises asking for a goods card during empty vehicle entrance, weighing an empty vehicle and excluding tare, swiping the card at a goods yard, weighing and determining a heavy vehicle, paying and determining, and swiping the card/shooting pictures/comparing/determining/releasing during exit; and the method can thoroughly avoid the illegal actions such as man-made weighing cheat, loading cheat, variety switch, vehicle change, and the like. The system is authorized to different departments with different level authorities through an authorization mode of different levels, has the functions of video, positioning and locking of identity cards, and avoids the illegal actions of switching license plates and vehicles. The system and the method automatically identify, determine and balance, improve the working efficiency, and are widely applicable to storage and transportation goods yards and storehouses in various industries such as coal, metallurgy, oil products, and the like.
Owner:XIAN ZHONGTAI ELECTRONICS TECH

Medical information intelligent data platform, use method and application thereof

The invention discloses a medical information intelligent data platform, a use method and the application of the medical information intelligent data platform, and relates to the technology of medical information. The medical information intelligent data platform is a unified information resource center which can integrate the medical information, achieves medical data unified management, information sharing, early warning and monitoring, and is suitable for tertiary medical institutions in the whole country. The platform comprises an application server, a data server and a client terminal, wherein the application server, the data server and the client terminal are communicated in a wireless or wire mode, the data server is used for storing data information, the data server and a service system are interconnected in an authorization mode, and the data server obtains the data information from the service system. A system server sends out a command to the data server, and the data information of the service system is collected to the data server in a regular or real-time mode, and stored in the data server. A data calling and showing platform and a calling center are installed on the application server. The calling center is used for conducting content transferring between the client terminal and the application server.
Owner:XUZHOU TONGRUAN COMP SYST INTEGRATION

Software authorization management method and software authorization management system

The embodiment of the invention discloses a software authorization management method and a software authorization management system. The software authorization management method comprises the following steps: a user side searching authorization information locally by utilizing an authorized agency integrated in software business according to the operation of the software business initiated by a user, wherein the authorization information comprises effective user side hardware information and effective user side quantitative restriction; if the authorization information is searched, the authorized agency judging whether the authorization information is effective or not according to a preset authorization judgment rule, if the authorization information is effective, permitting the user to use the business on the user side; if the authorization information is ineffective, sending an application authorization request to an authorization management server, and thus obtaining an authorization file; if the authorization information is not searched, the authorization agency searching the authorization file locally, and if the authorization file is searched, installing the authorization file so as to obtain the authorization information; if the authorization file is not searched, sending the application authorization request to the authorization management server, and thus obtaining the authorization file.
Owner:深圳市国信互联科技有限公司

User authentication and authorization method and system for implementing user authentication and authorization method

The invention provides a user authentication and authorization method and a system for implementing the user authentication and authorization method. When a user end launches a business access request, a business server checks whether the user is a contracted user in accordance with identity information of the user; if the user is the contracted user based on the user identity information, the communication mode of at least one social relation user is selected from the user contracted information as an authentication end; the business server judges the validity of the user identity in accordance with information provided by the authentication end; and if the user identity is valid, the business server authorizes a user end and carries out corresponding business access responses. The method and the system for implementing the method provided by the invention are used to overcome the defects in a background technology and effectively ensure the security of user information and network services by using a mode that the communication mode of at least one social relation user is selected from the contracted information which is kept at the time of signing a business service by the user as the authentication end, and the business server judges the validity of the user end identity in accordance with the information provided by the authentication end and authorizes the user end.
Owner:王冬梅

Role-based web remote authentication and authorization method and system thereof

The invention relates to a role-based web remote authentication and authorization method and a system thereof. According to the authentication and authorization method, user authority is defined according to a user role; when the user requests remote access to resources of different levels, a mode in which the user needs to be authenticated is selected; when the user requests access to resources at a low level in the system, wherein the resources are non-sensitive ones, password authentication is only needed to be carried out; and when the user requests access to resources at a high level in the system, wherein the resources are sensitive one, a global unique identification code is used to carry out authentication. During the authentication process with utilization of the global unique identification code, collection on the global unique identification code is realized on a Web browser terminal by using a loading plug-in unit or control technology. According to the invention, because a grading authentication and authorization mode is employed, complexity of authentication and authorization of a user can be reduced and thus security of the authentication and authorization is enhanced; and cross-platform and cross-browser utilization can be realized, so that better user experience can be realized.
Owner:CHINA STANDARD SOFTWARE

Unified certification method for users

The invention relates to a unified certification method for users. The method comprises the steps that a third platform or a website is accessed to a platform, and register and accessing application are conducted on the platform; the platform which is registered by the users or a logging button of the website is accessed to the third platform or the website; the users carry unique identification,a unique secret key and a call-back address in logging, and the users are positioned to an authorization page of an authorization server; the authorization page is started, the users click authorization, and the third platform or the website acquires logging information of the current users; after authorization succeeds, the authorization server can generate an authorization mode code; the third platform or the website acquires the authorization mode code, corresponding parameters are set, and the authorization mode code is used for requesting an access token from the authorization server; thethird party website parses data which is returned by the authorization server, the access token is obtained, and user information is acquired. According to the unified certification method for users,the users can log in and have access to different platforms or websites at one time, and the users log in the website more safely and quickly.
Owner:昆山云景商务服务有限公司

Identity authorization controlling method and system

InactiveCN104392165AImprove the efficiency of identity authorizationImprove efficiencyDigital data authenticationAuthorization ModeControl system
The invention discloses an identity authorization controlling method and an identity authorization controlling system. The method comprises the following steps that a first terminal encrypts authorization data according to a preset encryption algorithm, acquires encryption authorization data and transmits the encryption authorization data to a second terminal; the second terminal receives the encryption authorization data and transmits the encryption authorization data to a non-contact card reader in a near-distance wireless communication way; when sensing the second terminal in the near-distance wireless communication way, the non-contact card reader acquires the encryption authorization data, decrypts the encryption authorization data according to a decryption algorithm corresponding to the encryption algorithm to acquire the authorization data, performs identity authorization for the second terminal according to the authorization data, and releases the limits of authority of a controlled target. By the scheme, the identity authorization efficiency of the second terminal is greatly improved, the efficiency of releasing the limits of authority of the controlled target is improved, meanwhile, the cost caused by manufacturing an IC (integrated circuit) card is avoided, and the cost is saved.
Owner:HITACHI BUILDING TECH GUANGZHOU CO LTD

Method and device for controlling login state based on mini-program architecture

The invention discloses a method and device for controlling login state based on mini-program architecture, and the method comprises the steps: detecting that a user enters a small program, and obtaining the login state of the user; if the user has the login state and the authorization mode is not silent authorization, entering the applet; if the user has the login state and the authorization modeis silent authorization, obtaining the authorization login state of the user, and if it is detected that the user authorizes to log in the applet, enabling the control server to request user information from the WeChat server, obtain complete user information, complete login and enter the applet; and if it is detected that the user does not authorize to log in the applet, controlling the server to obtain a part of user information from the WeChat server, logging in according to the part of user information, and entering a corresponding page in the applet. According to the embodiment of the invention, when the small program is logged in, the server side stores the authorization login information of the user, and the authorization login information is improved from the client side to the WeChat side to the server side to the client side to the server side, so that the request time is greatly reduced, and the user loss is reduced.
Owner:SHENZHEN DIANMAO TECH CO LTD

Vehicle authorization management method and system

The invention belongs to the field of automobile electronic-communication technology, and particularly relates to a vehicle authorization management method and system. For better satisfying differentuse requirements of vehicles, the vehicle authorization management method provided by the invention includes the following steps: receiving request information of a vehicle; and executing a corresponding authorization manner according to the request information, wherein authorization manners include a service authorization manner and an active authorization manner. The authorization management method also includes: monitoring use records of the vehicle in an authorized period in real time; and storing the use records. According to the method, use authority of the vehicle can be flexibly and conveniently allocated and managed through the service authorization manner or the active authorization manner without the need for transferring vehicle use right through a manner of transferring a key,and vehicle use experience of a vehicle owner is improved; and in addition, the use records of the vehicle in the authorized period can also be stored to facilitate viewing of the vehicle owner on driving mileage of the vehicle in the authorized period, and thus authorized use behaviors of the vehicle of the vehicle owner are effectively managed.
Owner:NIO ANHUI HLDG CO LTD

Combined quantum broadcast communication monitoring method based on partially entangled GHZ channel

The invention discloses a combined quantum broadcast communication monitoring method based on a partially entangled GHZ channel. The method includes the steps that a multi-particle partially entangled GHZ state is prepared through a sender on the basis of an information transfer mode, a corresponding number of auxiliary particles are led in according to the number of supervisors to be used as control particles, a part of particles in the GHZ state are selected to be used as monitored particles, CNOT operation is performed on the auxiliary particles and the selected monitored particles, then the particles are sent to the supervisors and receiving users, the sender performs Bell measurement, check bits are published, the supervisors perform single-particle measurement, measuring results are used as authorization information to be released to the corresponding legal authorization limited users, and the authorization limited users obtain real broadcast data of the sender according to Bell measuring results, checking information and the authorization information. According to the method, the effect that the flow directions of the broadcast data are monitored by the supervisors in a combined mode under the authorization mode is achieved, the requirement for the maximum entangled channel and complicated entanglement concentration operation can be avoided, and the method has good practicability and feasibility.
Owner:SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products