Cross-domain rights management system and method

A rights management, cross-domain technology, applied in the field of cross-domain user rights management system, can solve the problems that the application container does not provide support, increases the difficulty of system development, and is difficult to manage

Inactive Publication Date: 2010-02-10
国家信息中心
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, both of these two methods have the following disadvantages: that is, it is difficult to implement and dif...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain rights management system and method
  • Cross-domain rights management system and method
  • Cross-domain rights management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the cross-domain rights management system and cross-domain rights management method provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0027]First, some terms involved in the present invention are defined. In recent years, with the rapid development of digital identity authentication technology and the popularization of national information construction, some domain concepts are often mentioned, such as security domain, trust domain, application domain and so on. In order to avoid confusion, it is necessary to define the "domain" involved in the present invention: the "domain" mentioned in the present invention includes the trust domain and the application domain, and the so-called trust domain refers to the CA institution as the basis for division, that is, Said that the units and individuals ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cross-domain rights management system, comprising a front-end acting module, an identity authentication module, a rights confirmation module and a database; the front-end acting module is used for constructing data transmission channels between users and application systems, between application systems and the identity authentication module, and between the application systems and the rights confirmation module; the identity authentication module supports identity certificates awarded by multiple certification authorities to carry out identity authentication on usersaccessing in the application systems; the rights confirmation module is oriented to all the application systems of the whole cross-domain rights management system and is used for confirming the accessrights of users to the application systems and transmitting the confirmed access rights to the front-end acting module; the database is used for storing data related to users, multiple certificationauthorities and multiple application systems. In addition, the invention also discloses a cross-domain rights management method. The system and the method provided by the invention can realize rightsmanagement of cross trust domain and application domain, enables application systems therein to have enough adaptability and expansibility, and improves access efficiency for users simultaneously.

Description

technical field [0001] The present invention relates to information security technology, in particular to a cross-domain user authority management system and a related method. Background technique [0002] With the rapid development of society and economy, computer networks are playing an increasingly important role. For example, various companies and government agencies have gradually established multi-application and multi-service IT architectures. Generally speaking, various applications and service systems currently in use are constructed by different developers using different technologies at different times, such as: mail system, government internal office system, document management system, call system, GIS system, etc. . In these application systems, due to the differences in system infrastructure, coding methods, and application resource types, most application systems use self-contained identity authentication, user management, and authorization management systems...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 吴亚非李新友任金强陈晨
Owner 国家信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products