Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

251 results about "Computer access control" patented technology

In computer security, general access control includes identification, authorization, authentication, access approval, and audit. A more narrow definition of access control would cover only access approval, whereby the system makes a decision to grant or reject an access request from an already authenticated subject, based on what the subject is authorized to access. Authentication and access control are often combined into a single operation, so that access is approved based on successful authentication, or based on an anonymous access token. Authentication methods and tokens include passwords, biometric scans, physical keys, electronic keys and devices, hidden paths, social barriers, and monitoring by humans and automated systems.

Biometric access control and time and attendance network including configurable system-on-chip (CSOC) processors with embedded programmable logic

A biometric access control and time and attendance system comprises an integrated network including one or more remote access devices in electronic communication with a computer database. Each remote access device comprises a silicon chip based system and preferably includes a biometric input device, a liquid crystal display (LCD), computer processing capabilities based on embedded system architecture with configurable system-on-chip (CSOC) technology, and an electrical output for controlling a door lock or the like. The use of CSOC architecture in lieu of conventional personal computer technology (e.g. mother boards, hard drives, video controllers and the like) allows for a more compact and cost efficient design. A plurality of remote access devices is configured for communication with a primary computer database wherein data corresponding to biometric samples for all authorized users is stored. In an embodiment wherein the biometric input devices comprise fingerprint scanners, the devices are configured to facilitate fingerprint identification by incorporating an auto-targeting capability that enables the user to simply place his or her finger on the fingerprint scanner whereafter the system adjusts the scanned image by automatically shifting the scanned image data to a properly targeted position thereby enabling the system compare the scanned print to the biometric samples in the system's data storage memory. Auto-targeting capability eliminates the requirement for manual targeting present in systems of the background art thereby improving system performance and minimizing reliance on human interaction. The present invention contemplates the use of auto-targeting with other biometric systems, such as facial recognition and/or retinal scanning systems, or any other biometric identification technology.
Owner:PROFILE SOLUTIONS

Biometric access control system incorporating a touchscreen accessible and kiosk based id station operating in combination with multiple critical asset retaining racks and locers for permitting selective biometric input and processor driven/wireless release authorization, maintenance and inventory control of any plurality of critical assets and including an associated computer writeable medium operating with the id station for enabling asset release, reentry and associated inventory control

A biometric access control system for tracking critical assets and including an ID station incorporating a biometric input reader, an RFID antenna and reader and a wired or wireless (Bluetooth) communication device. A remotely positioned structure includes either or both of a rack or a locker for holding a plurality of the critical assets in individually locked fashion. A processor control built into the ID station operatively actuates each of a plurality of individual locking mechanisms incorporated into the rack structure or locker, in response to successive biometric and weapon selection inputs communicating with the processor, and for determining at least one of user identification and weapon release authorization prior to the processor actuating the locking mechanism to release the weapon. An associated computer writeable medium operates with the processor and establishes a series of subroutines for establishing user identification, weapons rating, selective weapon release/reentry and associated maintenance and record keeping log reports.
Owner:LAW ENFORCEMENT INTELLIGENT DEVICES

Community access control system and method

The invention discloses a community access control system and method. The community access control system comprises community gate access control, unit gate access control, proprietor gate access control and an access management server, wherein the community gate access control realizes proprietor identity verification, fellow visitor identification and visitor registration functions; the unit gate access control realizes user arrival time pre-judgment, elevator dispatching and visitor walking navigation functions; the proprietor gate access control realizes proprietor identity verification and proprietor trip reminder functions. The invention provides a brand new access control system management plan, which is a full set of safety access control solutions for the process from going out to backing home, and provides multiple humanization functions to improve the user experience. The time when a user arrives at a unit gate is pre-judged, and an elevator is dispatched in advance for waiting. The destination floor of the elevator can be automatically set for going up and down. When the visitor arrives on the destination floor, the walking navigation route can be broadcasted by voice, so that the high-end atmospheric grade effect is achieved. An indoor partition authorized visit function is realized, so that the proprietor has no need to worry about maintenance workers entering the room to maintain when the proprietor is not at home.
Owner:CHENGDU BILSUM SCI & TECH DEVCO

Door access control system and method

A door access control system and method is provided. The method comprises: a door access device; a server; and an owner's cellphone, a visitor's cellphone and a management center client that are in communication connection with the server; the management center client records door access device data and owner's data and uploads the data to the server; the server is used for managing a door access APP and storing and processing all running data of the door access device; the owner's cellphone registers on the server to acquire an owner login permission of the door access APP, the door access APP with the owner login permission authorizes the visitor's cellphone to register on the server to acquire a visitor login right of the door access APP to pass through a specified door access device within a specified time interval. An owner may authorize a visitor directly through the door access AP, operating is simple, temporary authorization from a management office or security staff is not required, and great convenience is brought to the owner and visitor; authentications of the owner and visitor are all controlled via the server, there is no need for pushing authorization information to a door access control for updating, and the door access control need not be networked.
Owner:深圳慧锐通智能技术股份有限公司

Computer security access control system and method

InactiveCN101986325AImplement secure storage protectionLow costDigital data authenticationOperational systemControl system
The invention discloses a computer security access control system and a computer security access control method, and belongs to the technical field of information security. A unified extensible firmware interface (UEFI) chip and a transmission control module (TCM) chip are included; a control system comprises an operating system pre-booting access control subsystem and an operating system running access control subsystem, wherein the operating system pre-booting access control subsystem comprises USBKey equipment, a USBkey equipment initialization module, a user management module, an operating system pre-booting identity authentication module and an encryption storage module; and the operating system running access control subsystem comprises USBKey equipment, an operating system user logon module, and an operating system user running protection module. The control method comprises an initialization method, an operating system pre-booting access control method and an operating system running access control method. The invention solves the problems that in the operating system, the reliability of access control is low, user identity information storage is insecure, and identity protection is insufficient in the running process after a user with legal identity logs on.
Owner:SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD

Method and apparatus implementing remote access control based on portable memory apparatus

InactiveCN101340436AReduce the certification burdenPrevent Authentication BlockingUser identity/authority verificationComputer hardwareApplication server
The invention discloses a method and a device for realizing remote access control based on a portable storage device, the method comprises that: an authentication server receives a request access message which is sent by an intelligent storage card, and the request access message comprises an identifier of the intelligent storage card, the identifier of an application server and an identifier related key; the authentication server obtains the stored identifier related key which is corresponding to the identifier of the intelligent storage card and compares with the identifier related key in the request access message, if the two are consistent, a request access response message is returned to the intelligent storage card; the application server receives a service request message which contains the identifier of the intelligent storage card and a note and is sent by the intelligent storage card, a key decryption note which is shared with the authentication server is adopted for verifying the consistency of the identifier of the intelligent storage card which is contained in the note and the identifier of he intelligent storage card which is not encrypted in the service request message, thereby providing the service for the intelligent storage card. The proposal of the invention can realize the separation of the authentication and the application, thereby alleviating the burden on the application server for carrying out the authentication of the intelligent storage card.
Owner:POTEVIO INFORMATION TECH

Secure access control system and method for network terminal nodes

InactiveCN104796261AReal-time monitoring of identity informationReal-time monitoring of the access verification processUser identity/authority verificationNetwork terminationPrivate network
The invention discloses a secure access control system and method for network terminal nodes. A C/S (client/server) architecture is provided between a secure access client and a CA (certificate authority) authentication server, and another C/S architecture is provided between the secure access client and an RADIUS (remote authentication dial-in user service) authentication server; the two C/S architectures are used for user identity authentication and terminal access authentication, respectively. A B/S (browser/server) architecture is provided between a security management client and a security management server and is used mainly for registering and checking user information, setting network access group permissions and controlling and monitoring secure access in real time. The secure access control system and method has the advantages that the access terminals can be subjected to trusted identity authentication, trusted access authentication, terminal proxy authentication, network access permission control and network access state real-time monitoring; a trusted terminal access control system based on identity authentication is achieved and is stable and reliable and is high in authentication efficiency, violations such as NAT (network address translation) and proxy services can be detected and warned accurately, network states of terminal users are monitored and controlled through a web management interface, and the needs of private networks for safety management can be fully met.
Owner:CHANGAN UNIV

Cloud voiceprint recognition system and method for community access control

The invention provides a cloud voiceprint recognition system and method for community access control. The method is characterized in that a user inputs a preset voiceprint password through a user terminal, and after successful voice recognition, the preset voiceprint password is transmitted to a cloud server for processing and storage; and then, the user can speak out a check voiceprint password at an access controller, and the access controller carries out voice recognition and voiceprint acquisition, and then, transmits the check voiceprint password to the cloud end for voiceprint modeling processing and comparison, and recognition is carried out by utilizing powerful computation ability of the cloud end. When the preset voiceprint password and the check voiceprint password are collected, voice recognition is carried out to improve recognition efficiency; and legality of the voiceprint is verified through asymmetric error rate, so that the user can pass through the access control more smoothly, and each opening action and record can be obtained. The method and system provide basis for deploying a voiceprint recognition system in a community in a large area, so that user learningcost is low, construction-side installation cost is low and operation-side maintenance cost is low, and passage convenience and passage efficiency of community access control can be improved effectively.
Owner:青岛易方德物联科技有限公司

Trust-based access control method and system thereof

The invention discloses a trust-based access control method and a system thereof, belonging to the field of computer access control. The trust-based access control method comprises the following steps: 1), establishing a role-trust describing model; 2), for each role r in an autonomous domain B, determining a mapping relationship of a role in another autonomous domain A to the role r, and making mapping of the role in the A to the role in the B meet the mapping relationship; 3), according to the mapping relationship, dividing an authority set of the role r into different authority subsets, and correlating the divided subsets to corresponding trust values; 4), when of a main role in the A accesses resources in the B, analyzing information of the accessing main role first and then mapping the information of the accessing main role to the role in the autonomous domain B, and obtaining a trust value; and 5) according to the role information and the trust value of the accessing main role, determining a resource accessing authority of a current access request by the autonomous domain B. The trust-based access control method and the trust-based access control system effectively compensate for a defect that the conventional role access control cannot adapt to a distributed cooperative development environment.
Owner:山东经伟晟睿数据技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products