Network resource integration access method based on registration and authentication

An access method and network resource technology, applied in the field of network resource access, can solve problems such as difficult control of UDDI, uncontrollable service, non-support of registration and query of other users and personalized application resources, etc.

Inactive Publication Date: 2008-04-02
上海信息安全基础设施研究中心
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2. The registered service cannot be controlled when it is used
When other people or applications use the services registered on UDDI, it is difficult for UDDI to control them, such as: it is impossible to know who uses which service, how many times it is used in total, etc.;
[0007] 3. Registered services need to be actively quer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network resource integration access method based on registration and authentication
  • Network resource integration access method based on registration and authentication
  • Network resource integration access method based on registration and authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The invention relates to publishing, searching and positioning of network resources, especially in a large-scale network environment, the publishing, searching and positioning of network resources including users and services across regions, departments and trust domains.

[0029] The invention introduces a method for publishing, discovering, locating and accessing network resources including contacts, business applications and common services.

[0030] The invention adopts a method of unified registration, unified authentication and unified management to provide credible release, discovery, positioning and service functions for resources and services in the private networks of e-government affairs, e-commerce and other industries.

[0031] This method uniformly marks all kinds of network resources and services, releases them through trusted registration, for users to query and apply for resources, and can provide users with active push of resources and resource status a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method for accessing conformingly the network resource basing on the registered authentication, which comprises the steps of: arranging resource identification code for the user and the application of the business; respectively doing authentication to the user and the application of the business according to the resource identification code to facilitate the user and the application of the user become the authentic resource; doing applying by the user to the business application which is need to be used and is authenticated when the authentication of the user is completed; orienting the applied business application; and accessing the business application; the method of the invention provides an authentic releasing mechanism for the network resource and causes the reliability become one property of the resource; and causes that the using condition of the network resource is controllable.

Description

technical field [0001] The invention relates to the field of network resource access, in particular to a controllable network resource access method. technical background [0002] At present, whether in the field of e-government or e-commerce, a large number of application systems are built on various private networks with the Internet as the networking model. The Internet networking mode has the characteristics of "no center, no management, uncontrollable, untrustworthy, and insecure". Among them, "no center" means that each node on the Internet is meshed and scattered, and there is only a center for network access. The center of network management; "no management" refers to the lack of unified management of resources including users and services on the Internet; services, how long they have been accessed, etc., and it is impossible to further develop value-added computer network services centered on operations; "Insecure" means that the Internet itself does not provide a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/28H04L12/46
Inventor 顾青陆蓓婷王于刘海涛谢超
Owner 上海信息安全基础设施研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products