Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

70 results about "Discretionary access control" patented technology

In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject (unless restrained by mandatory access control)".

Method and apparatus for automatically detecting sensitive information, applying policies based on a structured taxonomy and dynamically enforcing and reporting on the protection of sensitive data through a software permission wrapper

The present invention relates to the automatic detection of sensitive digital information, and the identification methods, application and enforcement of information security policies for digital information controlled through a software permission wrapper throughout the useful life of the information. This invention includes a unique taxonomy that defines the policies and rules regarding how the information is controlled automatically throughout its useful lifecycle based on the type of information, the stage of the information lifecycle, the user / group role accessing the information, the locality of the information, and the expected threats to the information. The taxonomy is maintained in a database that associates information security control policies and actions to sensitive data. These policies are enforced through a software permission wrapper that is used to encapsulate sensitive digital information. The software permission wrapper is used to control access and enforce digital rights to the information based on the taxonomy based policies for that information. The permission wrapper can automatically change the protection of the information based on pre-defined protection states that can automatically enforce discretionary access control rights to the sensitive information controlled in the permission wrapper. The changes to the level of protection occur dynamically based on changes in user locality, stage of information lifecycle, and user / group role and the detection of threats. In addition, there is provided an internal audit capability describing what actions the user has performed, where the data is located, with whom and how the data has been shared.
Owner:ENCRYPTX CORP

Device and method of local oscillator leakage fast calibration

The invention provides a device and a method of local oscillator leakage fast calibration. The device and the method of local oscillator leakage fast calibration comprises a mixer, an analog to digital converter (ADC) circuit, field programmable gate array (FPGA), and a processor and a discretionary access control (DAC) register. The mixer is used for frequency conversion of a feedback signal formed by a local oscillator signal transmitted from a transmitter to generate an intermediate frequency signal. The ADC circuit is used for converting the intermediate frequency signal to a digital signal. The FPGA is used for collecting the digital signal and meanwhile calculating and accumulating in-phase/quadrature (I/Q) data. The processor is used for calculating local oscillator power according to results of calculating and accumulating. The DAC register is used for correcting local oscillator leakage direct current according to the local oscillator power. Through the device and the method of local oscillator leakage fast calibration, interference and miscalculation of feedback direct current leakage to transmitted direct current leakage can be avoided, and correction time of local oscillator leakage direct current can be shortened greatly.
Owner:DATANG MOBILE COMM EQUIP CO LTD

Cloud storage fine grit access control method and data uploading and data accessing method

ActiveCN108900483ATo achieve the purpose of fine-grained access controlGuaranteed safe storageTransmissionAttribute-based encryptionData access control
The invention provides a cloud storage fine grit access control method. The method is compatible to access control of a Hadoop assembly in a Plugin way and access control is performed through a central authorization server. Requests intercepted and sent to the central authorization server from the Plugins are accessed to a strategy engine by accessing a binding layer. Authority strategies are encrypted/decrypted through a strategy encryption/decryption layer, finally, through an engine background, storage and reading of the authority strategies are finished, and the storage form is authority encryption ciphers. The decrypted authority strategies are analyzed by the strategy engine, and authorities which can be identified by each Plugin are obtained through the analysis and returned to thecorresponding Plugins. Verification of the authorities is finished by the Plugins and whether user requests of this time are permitted is judged through the Plugins. According to the invention, by introducing autonomous access control, access control authorization of data by a data uploader is achieved; and by introducing a method based on attribute-based encryption, self-description of an accesscontrol structure is performed through attribute labels of data.
Owner:JIANGSU R & D CENTER FOR INTERNET OF THINGS

Environmentally-friendly medical waste treatment apparatus and method specific to medical institutions

A medical waste treatment device for health-care facility includes a frame, a waste disposal device and a control system; wherein the waste disposal device comprises three or more waste disposal boxes which are arranged in a row; a feeding conveyor belt is disposed at one side of the waste disposal boxes and the feeding conveyor belt extends to positions above each of the waste disposal boxes; the feeding conveyor belt is driven by a motor; each of the waste disposal boxes is provided with a waste label identification component, a pushing component which is configured to push waste container into the waste disposal box, and a sealing component; a feeding access is opened on the top of each of the waste disposal boxes and a discharge access is opened on the bottom of each of the waste disposal boxes; a feeding access control system is provided at each of the feeding access and a discharge access control system is provided at each of the discharge access; a branch conveyor belt is disposed below the discharge access of the waste disposal boxes and a major conveyor belt is disposed adjacent to the branch conveyor belts; the control terminal of the motor, the waste label identification component, the pushing component, the sealing component, the feeding access control system and the discharge access control system are coupled with the central controller of the control system. The medical waste treatment device for health-care facility could avoid the collateral contamination caused by incineration, and further avoid the production of Dioxin. The medical waste treatment device could automatically identify and classify waste containers, and treat medical waste according to its category and then package and seal it.
Owner:QINGDAO BRIGHT MEDICAL MFG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products