Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

43 results about "Cross organizational" patented technology

In the Defense Travel System (DTS), the Cross-Organization (X-Org) Funding feature allows an organization to share a Line of Accounting (LOA), to make funding available to another organization or to a specific traveler.

Policy enforcement and access control for distributed networked services

Apparatus for controlling cross-organizational access by end users associated with a plurality of organizations to one or more distributed object services available via a resource server across an information technology communications network. The apparatus comprises at least one Requesting Organization (RO) having access to services via the resource server, the Requesting Organization being adapted to issue enrollments to one or more end users upon request and electronically transmitting the enrollments to the respective end users. The apparatus further comprises at least one Servicing Organization (SO) communicating with the Requesting Organization and defining the credentials required for access to a service via the resource server by end users associated with each of the organizations. A Clearance Service (CS) is provided in which is stored one or more mappings of enrollments to credentials, the end user being adapted to transmit to the resource server a request for access to a resource together with data relating to their respective enrollment, in response to receipt of which request, the Requesting Organization is adapted to transmit the data relating to the enrollment to the Clearance Service which is adapted to map the enrollment to one or more respective credentials and return data representative of the credentials to the resource server which in turn is adapted to compare the data representative of the credentials to the original resource request and to comply (or otherwise) with the request. The Requesting Organization the resource server and the Clearance Service are all implemented as web or e-services.
Owner:HEWLETT-PACKARD ENTERPRISE DEV LP

Cross-organization access control method based on alliance chain and multiple signatures

The invention relates to a cross-organization access control method based on an alliance chain and multiple signatures, and belongs to the technical field of block chains. According to the method, a non-centralized alliance chain technology is used as a trusted machine, distribution, updating and recovery of cross-organization access control authority are realized under the condition of no participation of a centralized third party, and authorization decision is carried out on a cross-organization access request based on an alliance chain intelligent contract. A single-point fault of the centralized node or malicious tampering of the access control authority can be effectively prevented. According to the method, participant nodes are added or removed based on an alliance chain admission mechanism, contract logic is deployed or updated, the method is effectively used for dynamic joining of participants and business logic change in a resource sharing system, and good expansibility is achieved. On the basis of a multi-signature technology, multi-party management control over the co-governance service is provided, and a group of role sets belonging to multiple organizations can jointly manage one co-governance service.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Joint credit scoring method and device based on privacy protection calculation and cross-organization

The invention provides a joint credit scoring method and device based on privacy protection calculation and cross-organization, and the method comprises the steps: constructing local data resources in a plurality of edge nodes, and synchronizing the basic information and metadata information of the local data resources to a central node; constructing a data model in the central node through the synchronized information to carry out association analysis, and constructing a data index; performing association mapping on the data index and the metadata information of the plurality of edge nodes; on the basis of the multiple updated local data resources, a public sample is determined through privacy protection set intersection; calculating a weight parameter of the data index system through a multi-party data mining algorithm, and assigning the weight parameter to each feature of the index system of the scoring system; and carrying out credit scoring through the constructed joint scoring system model. According to the method, a cross-organization joint scoring card system architecture is generated under a security privacy adding mechanism, and a high-dimensional complex scoring system can be constructed by effectively utilizing multi-dimensional data.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Multi-level multi-tenant cross authorization management method

The invention relates to a multi-level multi-tenant cross authorization management method, which comprises the following steps: defining a plurality of management roles in different organizations, and carrying out access permission and resource configuration on the management roles; selecting cross-server users in different organizations from the management role, and mounting the cross-server users on the management role to form a cross management role; and presetting a role consignment rule, and endowing the cross management role to a user according to the role consignment rule. The cross authorization and resource access of different management nodes can be carried out across organizations, the authorization tree can realize cross authorization management on all tenants, the authorization trees of all roles do not need to be modified in batches for newly introduced tenants, and the workload is very small. According to the invention, on the basis of a plurality of stackable tree-shaped management architectures, a plurality of layers of special management relationships are stacked, and cross authorization of a classical architecture and special requirements is considered, so that a management architecture which cannot be realized by a multi-tenant system of a traditional tree-shaped management architecture can be met.
Owner:北京天维信通科技股份有限公司

Network security service guarantee method

ActiveCN113098890AReduce R&D costsFully reflect the parallel relationshipTransmissionTransmission protocolConfidentiality
The invention relates to a network security service guarantee method, which is used for providing equal mutual trust and communication data security guarantee for transmitting sensitive data and business cooperation on a public network among different organization systems. The network security service guarantee method is implemented by an MSP component, a configuration center and a user-defined transmission protocol. The method comprises the following steps: starting the configuration center and initializing configuration; integrating and starting an MSP component; initializing the MSP component; organizing system node authorization and role permission division; establishing communication connection between the nodes; sending an interactive cooperation request; carrying out identity authentication and data verification on a sender; performing data decryption and role operation authority verification; and executing the business logic of the organization system. The network security service guarantee method provided by the invention has the core positive effects that a traditional single-party credit authentication mode is abandoned, cross-organization and cross-system cooperation is established on the basis of two-party or multi-party equal mutual trust, and the confidentiality and integrity of data transmission in the cooperation process are ensured by an enough security means.
Owner:深圳市骑换科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products