Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

76 results about "Permission system" patented technology

The permission system is the legislated methods of regulating activities that require permission or accreditation under Australian and Queensland government acts, regulations and the Zoning Plan. The Permission System Policy outlines the approach to managing the permission system within the Marine Parks.

Multi-hierarchy user permission management method

The invention discloses a multi-hierarchy user permission management method. All hierarchical relationships are centralized on organizations, superior-subordinate relationships of users, characters and permissions are transferred by the organizations to which the users, the characters and the permissions belong, and complexity brought to permission system design by multiple superior-subordinate relationships is greatly reduced. In the multi-hierarchy user permission management method disclosed by the invention, a data range is only associated with the organizations; after the users are authorized by "organizations-characters", when operation permissions are limited by the "characters", data operation ranges of the users are also limited by the "organizations", so that service logics of checking legalities of the data ranges are greatly simplified. Accounts, the organizations, the characters and the permissions have many-to-many relationships, and in an actual service, very high operation flexibility can be brought in. The multi-hierarchy user permission management method disclosed by the invention is designed on the basis of universality, and can be completely reused by modular design for various management systems of multi-hierarchy organizations, such as the education industry, government departments, group companies and the like. Based on the points above, the multi-hierarchy user permission management method disclosed by the invention can bring the effects of greatly simplifying the permission system service logic of the multi-hierarchy organizations and greatly reducing range checking logics, so that product quality can be improved, and development and maintenance cost is greatly reduced.
Owner:深圳开维信息技术股份有限公司

Permissions configuration management system

The invention relates to a permissions configuration management system, which belongs to the technical field of internet information technology. The system comprises a permissions definition module, a role definition module, a user definition module, a role and permissions relation maintaining module, a user and role relation maintaining module and an external interface module; the permissions definition module and the role definition module are connected through the role and permissions relation module; the data in the permissions definition module is stored in XML files; the data in the role definition module is stored in database; the data in the role and the permissions relation module is stored in the database; the role definition module and the user definition module are connected through the user and the role relation module; the data in the user definition module and the user and the role relation module are all stored in the database; and the external interface of the permissions system is connected with the database for transferring data of the database. The permissions configuration management system has a function of dynamically configuring permissions and is featured with simple configuration, strong extensibility and strong transferability.
Owner:BEIJING ITOWNET DIGITAL TECH

File sharing method based on encryption and permission system

The invention discloses a file sharing method based on an encryption and permission system. The file sharing method comprises the implementation steps that (1) a server establishes user information and sets the security level of a user; (2) the user logs in and carries out authentication; (3) the user sets the security level of a secret shared file, carries out encryption through a random secret key, stores the unique authentication code, the security level and the encryption secret key of the encrypted secret shared file on the server, and sends the encrypted secret shared file to a network; (4) when the secret shared file is used, a client sends a decryption request including the unique authentication code of the secret shared file and the security level of the user, if the security level of the user is higher than or the same as the security level of the secret shared file, the client can receive a decryption secret key fed back by the server, the client decrypts the secret shared file through the decryption secret key, and opens the secret shared file, and if the security level of the user is lower than the security level of the secret shared file, rejection information is fed back. The file sharing method based on the encryption and permission system has the advantages of being high in safety, convenient to use and capable of being used for sharing of secret files inside a unit.
Owner:XIDIAN UNIV

Alliance block chain wallet node communication permission system and method

The invention discloses an alliance block chain wallet node communication permission system and method. The system comprises a wallet node, a full node and a permission management system; the wallet node is configured and deployed at a personal client and is a block chain access entrance, so that the personal client can conveniently access the block chain to carry out transaction, and the wallet nodeprovides certificate application, communication request and acceptance, and transaction initiation and acceptance services for the user; the full node is configured to be deployed on a server and provided with a node of a complete block chain account book, synchronize all block chain data, independently verify all transactions on a block chain and update the data in real time, is responsible for broadcasting and verifying the transactions of the block chain, and is responsible for providing certificate verification, communication acceptance or certificate blacklist management service; and the permission management system is configured to be deployed on the alliance block chain, is responsible for auditing all wallet nodes on the alliance block chain, and is responsible for providing identity verification, certificate creation and issuing, certificate verification or certificate revocation services.
Owner:DAREWAY SOFTWARE

System and computer program for providing high delivery performance in a value chain

A system, computer program product and method for providing high delivery performance in a value chain network utilizing a finite capacity planning and scheduling model. The system includes a plurality of remote computers in communication with a respective plurality of remote users, a service provider computer having a computer program stored in non-transient memory and one or more microprocessors, a network interface in communication with the central server and the plurality of remote computers over a shared network, a shared database, having a master data repository and an execution data repository, in communication with the service provider computer, a multi-party module configured to onboard the plurality of remote users onto the shared network via the network interface, a real-time module configured to manage in real-time a shared data model common to at least a portion of the plurality of remote users, a permissibility network module having a permission system, a control system and software tools that manages access permissions to the shared network, the master data repository and to the execution data repository, and a planner module having an initial overall planning module and re-planning module. The re-planning module is configured to re-plan upon a change in condition in the value chain network and to limit planning to only those portions of the value chain network affected by the change in condition. Each of the plurality of remote users represents one of a plurality of entities in a value chain. Each of the plurality of remote users has at least one of a plurality of roles. The network interface is configured to receive one or more transactions via the shared network. The value chain network has shared access to a shared database on the service provider computer over the shared network. The shared data model is in communication with the master data repository and the execution data repository. The permission system is configured to provide access permissions to the plurality of remote users using predefined configuration settings. The control system includes rules that vary for each of the plurality of entities and by the respective role of the plurality of remote users. The rules define the read, write, edit and delete permissions and access rights to specific portions of the shared data model. The service provider computer is configured to: (i) provide access to the shared network to the plurality of remote computers based on the respective access permission of the one of the plurality of remote users provided by the permissibility network module, (ii) provide access to the master data repository and to the execution data repository based on the respective access permission of the one of the plurality of remote users provided by the permissibility network module, and (iii) manage access and updates to specific portions of the shared data model for all relevant remote users of the plurality of remote users.
Owner:ONE NETWORK ENTERPRISES

Dual-system code/file management platform architecture

The invention provides a dual-system code / file management platform architecture. The dual-system code / file management platform architecture comprises a function collection layer, a server layer, two permission system layers, an algorithm and logic layer, a database layer, two dual-front-end interface layers and two dual-rear-end system layers. According to the invention, two sets of system designsrespectively based on C / S architecture and B / S architecture are applied; Functions of code / file management, visualization, algorithm interface calling, algorithm search query recommendation, algorithm establishment, online and offline calculation and the like are realized by sharing part of database data, code files and the like, two sets of authority systems and authority price overflow systems,and a cloud server and a local server which are reasonably arranged, so that functional extension of conventional code / file management systems are carried out, the use difficulty is reduced, the working efficiency and the collaborative development efficiency are improved, a large amount of repeated work is avoided, the use experience is improved, research and development server resources can be ensured not to be additionally occupied, and the data transmission speed, the data transmission safety and the like can be ensured.
Owner:CETC BIGDATA RES INST CO LTD

Permission control method and device

The invention provides a permission control method and device and relates to the technical field of permission management. The method includes: receiving a user's access request, wherein the access request contains role information of a user; acquiring a permission model corresponding to the access request, wherein the permission model is generated according to at least one first-type metadata andpermission configuration items, the first-type metadata represents an organizational element in the organizational architecture, and the permission configuration items are used for indicating the value of the first-type metadata with access permission; determining the value of the organizational element corresponding to the role information of the user; determining whether the user has the accesspermission or not according to the value of the organizational element corresponding to the role information and the value of the first-type metadata in the permission model that has the access permission. The permission model is determined according to the organizational architecture element corresponding to the user, modification of the permission system is not needed when the organizational architecture is changed, the permission model is continuously used to perform permission judgment, and autoadaptation after one-step configuration of the permission model is achieved.
Owner:CHINA UNIONPAY

System for managing multi-Kubernetes cluster based on multiple users of enterprise

The invention discloses a system for managing a multi-kubernetes cluster based on multiple users of an enterprise. A client where a user is located sends authority authentication information to a server where a system is located; after the server where the system is located receives the authority authentication information sent by the client, the verification is performed through an enterprise user permission system; the enterprise user permission system of the server completes verification and allows the client to send an instruction to the server, and specifies a specific kubernetes clusterto be operated; the system forwards the operation instruction to the corresponding kubernetes cluster after receiving the operation instruction, and the kubernetes cluster processes the instruction, feeds back a result to the server side and feeds back the result to the client side where the user is located. Under the condition of the technical scheme, an enterprise can be helped to easily and quickly manage a plurality of kubernetes clusters and operating cloud service containers thereof in a production environment, and existing third-party public container cloud services can also be accessed, so that the enterprise can quickly expand the capacity during great promotion, and the operation cost is saved.
Owner:重庆天蓬网络有限公司

Authority system login access control method

The invention discloses an authority system login access control method. The method comprises a manager terminal and a user management module. The manager terminal is connected with an internal localarea network. The internal local area network is respectively connected with the firewall and the router. The manager terminal is further connected with the user terminal, the data sharing server andthe data exchange server. The user management module is connected with a user terminal. The user terminal enters the login entrance through CA certificate authentication. The login entrance logs in the body system through the certificate authentication module. The user terminal can enter the login entrance through password authentication. The login entrance logs in the body system through the password authentication module. According to the invention, CA certificate authentication and password authentication are utilized to facilitate login of a user permission system; the security of the system is improved, the operation efficiency of the system is improved through setting of a third party, an illegal user, a common user and an administrator user in the user management module, and the control method is simple, convenient to operate and capable of facilitating rapid login of the user and control of access permission.
Owner:达疆网络科技(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products