Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

426 results about "Inter-server" patented technology

In computer network protocol design, inter-server communication is an extension of the client–server model in which data are exchanged directly between servers. In some fields server-to-server (S2S) is used as an alternative, and the term inter-domain can in some cases be used interchangeably.

Inter-server communication using request with encrypted parameter

A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. Each retail site is equipped with a URL encryption object, which encrypts, according to a secret symmetric key shared between the retail site and the fulfillment site, information that is needed by the fulfillment site to process an order for content sold by the retail site. Upon selling a content item, the retail site transmits to the purchaser a web page having a link to a URL comprising the address of the fulfillment site and a parameter having the encrypted information. Upon following the link, the fulfillment site downloads the ordered content to the consumer, preparing the content if necessary in accordance with the type of security to be carried with the content. The fulfillment site includes an asynchronous fulfillment pipeline which logs information about processed transactions using a store-and-forward messaging service. The fulfillment site may be implemented as several server devices, each having a cache which stores frequently downloaded content items, in which case the asynchronous fulfillment pipeline may also be used to invalidate the cache if a change is made at one server that affects the cached content items. An activation site provides an activation certificate and a secure repository executable to consumer content-rendering devices which enables those content rendering devices to render content having an enhanced level of copy-resistance. The activation site “activates” client-reading devices in a way that binds them to a persona, and limits the number of devices that may be activated for a particular persona, or the rate at which such devices may be activated for a particular persona.
Owner:MICROSOFT TECH LICENSING LLC

Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system

The application provides an Internet of Vehicles safety communication method, a vehicle-mounted terminal, a server and a system. The Internet of Vehicles safety communication method is characterized by comprising the following steps: the vehicle-mounted terminal sends a handshake authentication request to a server after determining that the transmission control protocol connection with the server has been finished, wherein the handshake authentication request comprises an identifier of the vehicle-mounted terminal and a first Hash value encrypted by use of a symmetrical encryption algorithm same as that adopted by the server; the vehicle-mounted terminal receives an authentication response message returned by the server, wherein the authentication response message is returned by the server after determining that the vehicle-mounted terminal is legal; and the vehicle-mounted terminal establishes a safety authentication transmission protocol connection with the server according to the authentication response message. A lightweight safety authentication transmission protocol is established between the vehicle-mounted terminal and the server by use of less resource, and the security of the data transmission between the vehicle-mounted terminal and the server is improved.
Owner:NEUSOFT CORP

Data resource security control method in thin client mode

The invention belongs to the field of network security, and particularly relates to a data resource security control method in a thin client mode. The data resource security control method in the thin client mode comprises eight subsystems, namely the identity authentication subsystem, the remote application service subsystem, the security label subsystem, the file access control subsystem, the security communication subsystem, the security audit subsystem, the security storage subsystem and the management platform subsystem. Storage and control of files are mainly performed on a background server, the files are stored in different partitions according to user types or security levels of the files, the files are stored and protected, and a server side can not recognize the content of the files. When a user needs to have access to and process the files, the user logs in on a browser, identity authentication is conducted between the user and a server, and then file access connection is established. The files of a thin client are processed on the server side (provided by a physical application server or a virtual application server), no application or agent needs to be installed on the thin client, and interface interoperability is supported by related services released by remote application services.
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

A Method of Ensuring the Security of Client Software

The invention discloses a method for ensuring the security of client software. The method comprises the following steps of: 1, downloading the software by using a terminal, and adding terminal identity authentication information into a software packet by using a server; 2, transmitting a binding request to the server by using the terminal; 3, verifying the legality of the binding request, and if the binding request is legal, transmitting a binding success information to the terminal; 4, verifying the legality of the binding success information; 5, transmitting a login request to the server by using the terminal; 6, verifying the legality of the login request, and if the login request is legal, transmitting a login success information to the terminal; and 7, verifying the legality of the login success information, and if the login success information is legal, keeping a session. By the method, the software can be better prevented from being falsified; the security of communication between the terminal and the server can be ensured; replay attacks can be effectively prevented; the software can be detected whether to be falsified or not; and even though a hacker downloads the software and attacks the server by falsifying the software, only the terminal cannot be used normally and the normal use of other users may not be influenced.
Owner:北京无限新锐网络科技有限公司

Management and control method for user quota in multi-network storage system

ActiveCN102447736AAvoid wastingEnsure correct consistencyTransmissionControl systemComputer module
The invention discloses a management and control method for user quota in a multi-network storage system. The method comprises the following steps of starting a metadata server, starting an object storage server, starting a management end, carrying a client end, controlling quotas and back writing quotas. The invention further discloses a management and control system for user quotas. The system comprises a management end, a client end, a metadata server and an object storage server; the management end has an administrator client thread; the client end comprises a quota control module; the metadata server comprises a metadata service thread, a quota regularly synchronized client thread and an administrator service thread; and the object storage server has a document service thread and a quota regularly synchronized service thread. With the adoption of the method and system provided by the invention, waste of network bandwidth caused by unnecessary communication and excessive quota data among servers due to change of resource usage can be avoided, the influence of the quota control function to the system performance is reduced, and meanwhile, a quota consistency synchronizing mechanism is further provided to ensure correctness and consistency of the usage amount of user resources in the system.
Owner:HUAZHONG UNIV OF SCI & TECH

Data center energy consumption management method and system based on dynamic frequency modulation

The invention discloses a data center energy consumption management method and system based on dynamic frequency modulation. The method comprises frequency modulation energy conservation of a single server and task scheduling of energy awareness among servers, wherein the frequency modulation energy conservation of the single server comprises the steps of taking a time quantum of a constant task number as a frequency modulation unit, estimating dissipative energy of each unit according to an energy consumption model and task information, and utilizing a heuristic algorithm to select a frequency modulation mode which enables the sum of energy consumption of all units to be minimum so as to adjust the frequency of a processor; the task scheduling of energy awareness among the servers comprises the steps of selecting a candidate server according to the state of each server and the task information when a task reaches, utilizing a frequency modulation energy conservation method on the single server by each server according the task information to estimate the energy consumption change, selecting the server with the minimum energy consumption change by a controller to distribute a new task, and utilizing the frequency modulation energy conservation method on the single server by the selected server to modulate the frequency and operate the new task. According to the invention, the energy consumption of the servers in a data center is reduced by frequency modulation and task distribution, and energy saving and emission reduction effects are achieved.
Owner:NANJING UNIV

Belt conveyer remote video maintenance auxiliary diagnosis system

InactiveCN105578132AReduce economic lossSolve the problem of not being able to reach the scene immediatelyClosed circuit television systemsSelective content distributionTablet computerWeb service
The invention discloses a belt conveyer remote video maintenance auxiliary diagnosis system comprising a server, a client side and an equipment management database. The server comprises a web server and a streaming media server. The client side comprises an industrial tablet computer, a macro-focus camera, a 3G network and a standby battery. The whole system is based on a B-S mode. The client side logs in the system through a browser and enters a conference room to request for remote assistance according to set permissions. Onsite equipment situations are acquired by the macro-focus camera and transmitted to the server through the 3G network, and videos are analyzed and equipment is diagnosed by the experts of the server side. The equipment management database provides data support for onsite detection and diagnosis. The web server is the medium of a user side for accessing to the database and the streaming media server. The streaming media server realizes a streaming media service between the Flash client side and the server. The belt conveyer remote video maintenance auxiliary diagnosis system is easy to operate and convenient to use, and interaction of the site and the diagnosis experts can be realized and resource sharing can also be realized.
Owner:XIAN UNIV OF SCI & TECH

Andriod system-oriented implement method of mobile secure terminal

InactiveCN105025475AEnsure safetyDo not interfere with normal callsSecurity arrangementEnd-to-end encryptionVoice communication
The invention discloses an Andriod system-oriented implement method of a mobile secure terminal. The mobile secure terminal comprises an Andriod user registration module, an Andriod user management module, an Andriod calling module, an SIP signaling processing module, a key negotiation module, a server key negotiation module, a voice bridging module, an encrypted conversation module, a server encrypted conversation module and an SIP relay module. The implement method supports two encrypted communication modes: the first one is that one-time pad end-to-end encrypted voice communication for mobile terminals with Andriod operating systems is achieved while the two parties who communicate with each other are both secure terminals, namely the first mode is an end-to-end encrypted communication mode; the second one is that one-time pad encrypted voice communication from the mobile terminal with the Andriod operating system to a server is achieved while only one of the two parties who communicate with each other is the secure terminal, namely the second mode is a halfway encryption communication mode from the secure terminal to the server. The implement method of the invention does not need extra hardware to support, and is friendly in user interface and easy to operate.
Owner:东南大学常州研究院

Communication security enhancement agent system between Android platform browser and website server

The invention discloses a communication security enhancement agent system between an Android platform browser and a website server, and belongs to the technical field of computer and information security. The communication security enhancement agent comprises a handset or a flat computer and a server which are mutually communicated, wherein an Android platform arranged on the handset or the flat computer comprises the Android browser and is provided with a browser connecting redirection subsystem and an agent server subsystem; the server comprises the website server and is provided with an agent service support subsystem; and the browser connecting redirection subsystem, the Android browser, the agent server subsystem, the agent server support subsystem and the website server are sequentially communicated. The communication security enhancement agent system disclosed by the invention enhances the security under the condition without influencing user experience by executing a layer of encryption transmission between the browser and the website server, has the advantages of low cost, high generality and flexibility in configuration, can provide the security service with different intensities by regulating an encryption and decryption algorithm and is suitable for the secure communication process between a browser and a server of an Android operation system.
Owner:STATE GRID CORP OF CHINA +3
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products