Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

171 results about "Secure Shell" patented technology

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.

Systems and methods of inventory management utilizing unattended facilities

An inventory management system utilizes unattended facilities remote from a central warehouse for service parts logistics. Items are placed in inventory in secure enclosures at the unattended facilities by the inventory management service. The unattended facilities may be located near one or more customers to reduce a service technician's travel time and customers' inventory costs. A service technician utilizes a passcode to retrieve needed items. The service technician may order items that are not kept in the inventory of the unattended facility in which case the items may be delivered to the unattended facility and the service technician may receive a notification related to all the items that comprise an order that the order is ready for pick up at an unattended facility. Unused, used or damaged parts may be returned by a technician to a remote secure enclosure where such returned parts may be retrieved and disposed of, repaired or placed back into inventory if not damaged or after repair, and the processing of such returned parts begins by information entered into a data entry device at the remote secure enclosure location. Return items that are not damaged may be included in the inventory of an unattended facility.
Owner:UNITED PARCEL SERVICE OF AMERICAN INC

Systems and methods of inventory management utilizing unattended facilities

An inventory management system utilizes unattended facilities remote from a central warehouse for service parts logistics. Items are placed in inventory in secure enclosures at the unattended facilities by the inventory management service or are delivered directly to the unattended facility. The unattended facilities may be located near one or more customers to reduce a service technician's travel time and customers' inventory costs. A service technician utilizes a passcode to retrieve needed items. The service technician may order items that are not kept in the inventory of the unattended facility in which case the items may be delivered to the unattended facility and the service technician may receive a notification related to all the items that comprise an order that the order is ready for pick up at an unattended facility. Unused, used or damaged parts may be returned by a technician to a remote secure enclosure where such returned parts may be retrieved and disposed of, repaired or placed back into inventory if not damaged or after repair, and the processing of such returned parts begins by information entered into a data entry device at the remote secure enclosure location. Return items that are not damaged may be included in the inventory of an unattended facility.
Owner:UNITED PARCEL SERVICE OF AMERICAN INC

Process monitoring method and process monitoring system

The invention discloses a process monitoring method and a process monitoring system. The method comprises the following steps of: receiving a request for querying the list of monitored hosts from a client, acquiring the list of managed Windows and Linux hosts, and returning the list of the monitored hosts to the client; receiving information for polling a monitored host and the concerned process list of the host from the client, setting login information for logging in the host, and returning the concerned process list of the host to the client; and receiving information for querying the currently-running real-time process of the monitored host from the client, securely logging in the host based on SSH (Secure Shell) service, acquiring the list of all currently-running real-time processes of the host based on SNMP (Simple Network Management Protocol) service, filtering invalid process information according to the concerned process list of the host and a preset strategy, and outputting the acquired real-time process parameters to the client for exhibition. With the adoption of the process monitoring method and the process monitoring system, the cross-platform process monitoring can be achieved, and the cost for maintenance and development can be lowered.
Owner:SHENZHEN COSHIP ELECTRONICS CO LTD

Systems and methods of inventory management utilizing unattended facilities

An inventory management system utilizes unattended facilities remote from a central warehouse for service parts logistics. Items are placed in inventory in secure enclosures at the unattended facilities by the inventory management service or are delivered directly to the unattended facility. The unattended facilities may be located near one or more customers to reduce a service technician's travel time and customers' inventory costs. A service technician utilizes a passcode to retrieve needed items. The service technician may order items that are not kept in the inventory of the unattended facility in which case the items may be delivered to the unattended facility and the service technician may receive a notification related to all the items that comprise an order that the order is ready for pick up at an unattended facility. Unused, used or damaged parts may be returned by a technician to a remote secure enclosure where such returned parts may be retrieved and disposed of, repaired or placed back into inventory if not damaged or after repair, and the processing of such returned parts begins by information entered into a data entry device at the remote secure enclosure location. Return items that are not damaged may be included in the inventory of an unattended facility.
Owner:UNITED PARCEL SERVICE OF AMERICAN INC

Data Storage Management

Apparatus is disclosed for managing the use of storage devices on a network of computing devices, the network comprising a plurality of computing devices each running different operating systems, at least one data storage device, and a management system for controlling archival of data from the computing devices to the data storage device, the management system including a database of data previously archived; the apparatus comprising an agent running on a first computing device attached to the network, the first computing device running a first operating system, the agent being adapted to issue an instruction to a second computing device being one of the plurality of computing devices via a remote administration protocol, the second computing device running a second operating system that differs from the first operating system, and the instruction comprising a query to the database concerning data archived from computing devices running the second operating system. The remote administration protocol is preferably Secure Shell (SSH), but other protocols can be employed. A corresponding method and software agent are also disclosed. In addition, a data storage resource management system is disclosed, comprising a query agent and an analysis agent, the query agent being adapted to issue at least one query to a database of backed up or archived objects in order to elicit information relating to the objects; the analysis agent being adapted to organise the query results and display totals of objects meeting defined criteria.
Owner:SILVERSTRING

Docker container safety management method, system and equipment and storage medium

The invention provides a Docker container safety management method. The Docker container safety management method comprises the following steps: an SSHD (Solid State Hybrid Drive) service is installedin a Docker mirror; a container publishing module transmits container information of a creating container to a server information module; the server information module transmits the container information to an operation-maintenance safety audit module through an API (Application Programmable Interface); an authorization management module acquires operation permission information of the containerset by a user, and transmits the operation permission information to the operation-maintenance safety audit module; and the operation-maintenance safety audit module acquires a container access request of the user, performs login verification according to the operation permission information, is connected with the container through an SSH (Secure Shell) protocol if the verification is passed, so that the user logs in the container through the operation-maintenance safety audit module, and the operation-maintenance safety audit module denies the container access request of the user if the verification fails. Container authorization, safety control of login and operation audit are all finished by the operation-maintenance safety audit module, so that the safety of the container in a using process is ensured fully.
Owner:CTRIP TRAVEL NETWORK TECH SHANGHAI0

Secure access logic control method based on terminal access behavior and platform server

ActiveCN102984159ASimplify the difficulty of resource managementAvoid log audit complexityUser identity/authority verificationDot matrixFree interface
The invention discloses a secure access logic control method based on a terminal access behavior and a secure access platform server. A logic control module of the terminal access behavior is arranged at a secure access platform server terminal; information, such as terminal access authority, scene judging parameters, a dot matrix area command comparison table and the like is configured; each data package of terminal access intranet resource is redirected into an agent program which corresponds to the logic control module; and the logic control module identifies the terminal access behavior in various modes to control forwarding or discard. The method of the invention executes classification and identification of character commands, such as FTP (File Transfer Protocol), TELNET, SSH (Secure Shell) and the like, RDF (Resource Description Framework) graphical interface operation and user free interface system operation for the terminal access behavior on the secure access platform server terminal, and judges whether the execution is permitted or not according to identified commands and user authority logic control, so that the difficulty of resource management is simplified, the repeated authentication of each system is avoided; and the identification and the logic control of the character commands, the graphical interface operation and the like are solved.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER +3
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products