Multitime user authentication method for fusion business system with SOA architecture

A technology that integrates business and user authentication, applied in the field of integrated business systems, can solve problems such as inability to manage user rights, difficulty in determining user management data models, and inability to propose user authentication and authentication methods. Effect

Inactive Publication Date: 2009-07-01
INST OF ACOUSTICS CHINESE ACAD OF SCI
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to its open business structure, the converged service system of SOA architecture makes it difficult to determine the user management data model. So far, there is no unified user authentication method
[0004] The current authentication method widely used in multi-service systems in the IT field is single sign-on (Single Sign-On SSO), which means that one login can complete the identity verification in the entire business system. It is mainly used in client-server mode and cannot adapt to cross-terminal In addition, there is a Web Service Security (WS-Security) specification, which provides a set of mechanisms to help Web Services developers protect SOAP message exchange. It is mainly used for the encryption of communication messages in Web Services, and cannot propose a The user authentication and authentication method of the platform system; for the integrated business system of the SOA architecture, it can be seen that the above-mentioned authentication and authentication method has exposed many deficiencies: it is difficult to solve the different needs of multiple terminals, and it cannot meet the needs of different service providers for end users. Identity verification, unable to perform unified user rights management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multitime user authentication method for fusion business system with SOA architecture
  • Multitime user authentication method for fusion business system with SOA architecture
  • Multitime user authentication method for fusion business system with SOA architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The relatively mature application of a kind of SOA architecture fusion service system provided by the present invention is Web Services, whose server is mainly located on the Internet, and its client can be installed on terminals of different networks, so that the client and the server may need to pass through heterogeneous networks (GPRS CATV Internet...) The intercommunicating gateways perform cross-network connections and exchange information.

[0037] The multi-time user authentication and authentication method provided by the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0038] Such as figure 1 and figure 2 As shown, the multi-user authentication and authentication method of the converged service system of the SOA architecture provided by the present invention includes: the initial visit registration process, the confirmation terminal attribute search process, the mapping user process a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for authenticating users for more times in the converging service system of an SOA framework. The method comprises the following steps: firstly, preliminary visit logon procedure referring to a process that different terminal users preliminarily start software installed at a client terminal to log on at an authentication center, and initialize the client terminal; secondly, terminal attribute class determining process referring to a process that the users initiate requests in a specific service domain and the authentication center preliminarily authenticates the users, preliminarily authenticates according to an embodied terminal attribute, and initializes a service module selected and served; thirdly, mapping user process referring to a process that the authentication center acquires the specific information of the users at the client terminal through CSI during the process of requesting specific service and the specific information correlated to users from other sources; and fourthly, unified user process referring to a process that the authentication center transfers service requests and user information to an applicable fine-grained service layer and obtains uniform service from the users from different sources in the specific service module.

Description

technical field [0001] The invention relates to a fusion service system, in particular to an authentication authentication method in the user management of the fusion system of the SOA framework. Background technique [0002] Under the general trend of network convergence, a cross-network, cross-terminal, multi-media information converged service system has emerged in response to various demands. Its ultimate goal is to communicate various information based on a unified and comprehensive network, so that users can communicate through Different terminals can enjoy seamless and unified converged services at any time and any place. There are four types of technologies in the integrated service provision system: integrated intelligent network technology, SIP service provision technology, Parlay / OSA / OMA open service interface technology, and service-oriented architecture (SOA) technology (including WebServices middleware). [0003] The first three technologies are mainly used in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 王劲林白鹤李晔汤迪斌
Owner INST OF ACOUSTICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products