Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

239 results about "Strategy execution" patented technology

Internet of Things identity authentication method based on blockchain

The invention belongs to the technical field of identity authentication, and specifically provides an Internet of Things identity authentication method based on a blockchain. The basic steps of the Internet of Things identity authentication method provided by the invention are as follows: an entity calls an intelligent contract by means of an own key to accomplish the registration in an identity authentication system; each entity can call the intelligent contract to set an access strategy so as to limit the access of other entities to the entity and to form a trust network of the Internet of Things; when one entity accesses the data of the other entity, the entity needs to apply for a token from the intelligent contract to obtain the access qualification, and the intelligent contract checks whether the entity initiating the access has the access qualification according to the access strategy set by the accessed entity in the trust network between the entities, and if yes, the intelligent contract generates the token and returns the token to the entity initiating the access; or otherwise, the intelligent contract returns token application failure information. By adoption of the method provided by the invention, a centralized authority mechanism in an identity authentication process is removed, malicious tampering of records of identity authentication and data access is prevented, a strategy execution result is not manually manipulated, and a fair, transparent and credible execution environment is provided for the identity authentication of the entities in the Internet of Things.
Owner:FUDAN UNIV

Block-chain-based data rights protection method

The invention belongs to the technical field of data security, and specifically relates to a block-chain-based data rights protection method. The steps of method are as follows: a user owning data formulates data circulation strategies according to data rights that need protection, compiles the circulation strategies into an intelligent contract, and deploys the intelligent contract on a block chain system; and before other users perform data circulation, the user serving as a data transferee needs to use identity information and related data circulation attributes to call the intelligent contract, and the intelligent contract automatically provides an approval result of a circulation application according to the established data circulation strategies: if circulation is allowed, a dynamic circulation authorization code is returned to the transferee user; otherwise application failure is returned. The block-chain-based data rights protection method provided by the invention is an application of a block chain system, removes dependence on a third-party authority organization in a data rights protection process, ensures that the data circulation strategies formulated by the data owner are not maliciously modified, and a strategy execution result is not manually manipulated, thereby providing a just, transparent and credible execution environment for data circulation processes of data transactions, data opening and sharing and the like.
Owner:FUDAN UNIV

A system for charging control architecture based on network fusion policy and its processing method

The invention discloses a network amalgamation strategy charging control framework system and the processing method thereof. PCRF ensures PCC rules according to the QoS parameters and charging strategy that are authorized by business layer and the information about user signature; and provides the PCEF with the PCC rules. The PCEF, which acts as the interface between the PCRF and the PCC strategy execution entities and / or the PCC strategy execution entity, and carries on protocol transfer, information retransmission and / or strategy charging execution; the PCC strategy execution entity executes the QoS authorization of service data flow and the detection and charging of service flow according to the PCC rules; the invention proposes a practical feasible solution for the integration of WiMAX network with 3GPP / 3GPP2 network the PCC framework, realizes the strategy control and charging control of the WiMAX network on business by using the PCC framework, and resolves the problems about the integration of functional entities, like functional entities in the PCC framework, strategy charging entities SFA , DPF, the charged client terminal / charging agents and hometown agent HA of the WiMAX network. The invention has the proposal of a processing flow and amalgamation solution for the WiMAX network to use the PCC framework for realizing the strategy control and charging control on business.
Owner:HUAWEI TECH CO LTD

Android authority management method and system based on calling chain

The invention relates to an android authority management method and an android authority management system based on a calling chain. The system comprises a calling chain construction module, a strategy making module, a strategy judging module and a strategy executing module. The method comprises the following steps that 1) an application component requests for resources of a terminal system, a system application program interface (API) component is called for resource accessing, an application component calling chain is constructed, the property of the application component calling chain is set, and a system resource access strategy is made; 2) when the system API component is called, the calling chain to which the application component belongs is positioned, and strategy judgment and strategy execution are performed according to the property of the calling chain; and 3) if the property of the calling chain meets the strategy, the application component is permitted to call the system API component to successfully access the system resources, or otherwise, the application component is refused to access the system resources. According to the calling chain construction method, redundancy caused by the construction of calling chain for each component is avoided, and the system burden is reduced; the text environment of the calling chain and the authority requirement of all components of the calling chain are considered through the diversification of strategy elements; and therefore, the authority lifting attack is avoided.
Owner:HUAWEI TECH CO LTD +1

Software defined network cross-domain security agent method and software defined network cross-domain security agent system

The invention provides a software defined network cross-domain security agent method and a software defined network cross-domain security agent system. Unified access control and management are performed on cross-domain shared resources, security policy conflict is eliminated, and strategy synthetic efficiency is improved. The software defined network cross-domain security agent system comprises at least two integrated controllers, at least one multi-domain processing module and at least two inter-domain agent modules, wherein the inter-domain agent modules transmit cross-domain business requests to the multi-domain processing modules after performing semantic translation; each multi-domain processing module comprises a resource database and a strategy synthesis unit; and after the strategy synthesis units receive the cross-domain business requests, the resource databases are queried, the strategy synthesis is carried out, and cross-domain strategy configuration commands are transmitted to the inter-domain agent modules. The software defined network cross-domain security agent method comprises the following steps of transferred meaning requesting, authentication requesting, strategy analysis and synthesis, strategy distribution, strategy authentication, strategy execution and the like. By the software defined network cross-domain security agent method and the software defined network cross-domain security agent system, information exchange of a heterogeneous network is simplified, information integration and synchronization difficulty of the heterogeneous network are reduced, resource scheduling safety is guaranteed, multi-domain resource sharing is realized, and business load of the centralized controllers in various domains can be adjusted.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Fault tolerance method and system used for distributed program

ActiveCN101777020AEliminate the step of viewing process health status individuallySkip the step of viewing process healthSoftware testing/debuggingFault toleranceStrategy execution
The invention aims to provide a fault tolerance method and a system used for a distributed program, which can start program processes disposed on different fault tolerance clients according to a sequence. When any one process with a dependency relationship is collapsed, a fault tolerance server can execute the corresponding operation according to a strategy configured on the fault tolerance server, and the fault tolerance clients can start the processes according to the sequence as long as the fault tolerance clients utilize a traditional monitoring program to execute monitoring, take charge of reporting the process status and receive and execute an instruction transmitted by the fault tolerance server or issued by the operation maintenance personnel so as to ensure that the operation canbe normally carried out. The system is provided with a fault tolerance server and at least one fault tolerance client, wherein the fault tolerance clients monitor the status of the processes of the distributed program run by the fault tolerance clients per se. When the abnormity of the status is monitored, the fault tolerance clients inform the fault tolerance server, and the fault tolerance server utilizes a strategy execution module to execute restarting fault-tolerance treatment according to an automatic restarting strategy or a manual restarting strategy and the interprocess dependency relationship specified in a process dependency relationship form.
Owner:北京讯鸟软件有限公司

Apparatus, system and method for implementing access bandwidth dynamic regulation

The invention discloses a method for realizing the access bandwidth dynamic adjustment. In the method, a device for realizing the access bandwidth dynamic adjustment captures current uplink and downlink rate information of a user host, matching is carried out according to the rate information and locally preserved change strategies and whether the bandwidth is required to be changed is judged. If yes, a bandwidth change request is initiated to a bandwidth application service node, wherein, applied bandwidth adjustment parameters are included in the request. The bandwidth application service node sends the received bandwidth change request to a global resource management system and judges that whether the bandwidth change request is allowed according to a feedback result which is returned by the global resource management system. If yes, a bandwidth change instruction with new bandwidth value is sent to a strategy execution system. The strategy execution system adjusts the bandwidth of the user host according to the bandwidth change instruction. With the method adopted, the threshold of the on-demand bandwidth in use is lowered greatly and users can enjoy optimized access bandwidth under the condition that the users do not contact the bandwidth change technology.
Owner:ZTE CORP

System and method for monitoring integrated charger of multiplexed output coordination control electric automobile

The invention discloses a system and method for monitoring an integrated charger of a multiplexed output coordination control electric automobile. The system comprises a voltage and current real-time requirement acquisition module, an optimal strategy customizing module and a strategy execution module. The voltage and current real-time requirement acquisition module transmits requirements to the optimal strategy customizing module, the optimal strategy customizing module provides the requirements for the strategy execution module, the strategy execution module feeds an execution result back to the optimal strategy customizing module, and the optimal strategy customizing module outputs the result to the voltage and current real-time requirement acquisition module. The system and method for monitoring the integrated charger of the multiplexed output coordination control electric automobile has the advantages that an optimal power output strategy is selected by adopting an intelligent power allocation mode and adjusting voltage and current of the modules and multiple-module on-line and off-line states in real time, and the problems of the safety, the real-timeliness and the variety of the power, voltage and current requirements in the charging process of the electric automobile are solved.
Owner:SHANDONG LUNENG SOFTWARE TECH

Network policy architecture for legal monitoring system and its policy processing method

The present invention relates to a network strategy framework applied to a legal interception system, which comprises a strategy library, a global strategy decision point, a local strategy decision point connected with the global strategy decision point and a strategy execution point connected with the local strategy decision point. The present invention also relates to a strategy processing method, which has four steps. Firstly, the strategy execution point sends a registration request to the global strategy decision point via the local strategy decision point; secondly, according to the registration request, the global strategy decision point queries the strategy library to acquire a strategy template, which is then sent down; thirdly, the local strategy decision point analyzes strategy rules and, according to the strategy rules, derives strategy subclasses according to the strategy template; and finally, the strategy execution point obtains the strategy subclasses, which are then distributed. By means of a three-layer system strategy architecture, the present invention alleviates the processing load of the upper-layer global strategy decision point, flexibly loads various modules related to the strategy execution of the legal interception system and encrypts the sent-down strategy subclasses, thus protecting the safety of strategy information.
Owner:HUAZHONG UNIV OF SCI & TECH

Fast control method of fault island containing flexible DC

The invention discloses a fast control method of a fault island containing flexible DC. A control strategy execution scheme is formed through offline simulation calculation for the condition of an interconnected network of which regional network powers are connected with other power networks through AC and DC transmission channels separately; an offline control strategy is divided into an emergency control strategy and a non-emergency control strategy to correspond to control methods of different flexible DC; the strategy which is obtained through offline calculation in advance is searched according to frequency and frequency variation characteristics when the fault island is generated, execution is confirmed, a frequency and a frequency variation are continuously judged, and real-time complement can be carried out on an action result of a security and stability control device in a power system; and the stability of an island system is finally restored. The fast control method has the advantages that a flexible DC control method is directly determined in a manner of using an offline strategy searching scheme, the sampling calculation amount is small, judgment is fast and the control efficiency is high, thereby improving the frequency stability and the operation economy of the fault island.
Owner:ELECTRIC POWER SCHEDULING CONTROL CENT OF GUIZHOU POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products