Unlock instant, AI-driven research and patent intelligence for your innovation.

Integrated user safety management method and device

A security management and user management technology, applied in the field of centralized user security management, can solve hidden dangers, increase system complexity, cause security and other problems, and achieve the effect of flexible integrated management

Inactive Publication Date: 2009-06-17
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) Due to the need to transmit user names and passwords in the exposed interfaces between application systems, there are security risks;
[0006] 2) In order to support other user authentication methods such as digital certificates, the northbound interfaces of all systems need to add interface definitions, which increases the complexity of the system;
[0007] 3) Centralized user management and authorization cannot be realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrated user safety management method and device
  • Integrated user safety management method and device
  • Integrated user safety management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The core idea of ​​the present invention is to provide a centralized user security management method and device, which utilizes the centralized user management domain to realize secure centralized user management, authorization, authentication and audit, and achieve the effect of single sign-on.

[0034] The present invention provides a centralized user security management device, an embodiment structure of which is as follows figure 1 As shown, the device includes: a centralized user management domain and multiple application domains;

[0035] The centralized user management domain is used for unified management of multiple application domains, which at least includes: a centralized user management and authorization service entity and a centralized user authentication and audit service entity; the centralized user management and authorization service entity uses To realize the unified management and authorization of users, the authorization strategy can be defined by t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes steps: first, assigning authority for user, and receiving logging in request from user; next, authenticating authority of logged user, and assigning user an unique ID of current session; user with ID executes authority allowed operations in each application domain. The method and device realize centralized security management for user, authorization, authentication, and auditing so as to reach effect of single point logging in. since self-defining expansion of authentication and authorization is supported, the invention can be integrated flexibly to manage securities of multiple application systems.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and device for centralized user security management. Background technique [0002] In a complex telecommunication network, there are a large number of devices of different manufacturers and devices of different service types of the same manufacturer, and these devices are managed by different EMS systems. Each EMS system itself has complete user and authority management. Therefore, when a user maintains equipment from different manufacturers or different business types, the administrator needs to create an account, password, and assign permissions to the user in multiple EMS systems. When it is necessary to delete a user, it is also necessary to delete its account in each EMS system; and the user needs to re-enter the user name and password every time he operates a different EMS. With the expansion of the network scale, the types and quantities of EMS systems are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
Inventor 刘峰
Owner HUAWEI TECH CO LTD