Supervisory method and supervisory entity of authorization service of identify providing entity

An entity and identity technology, applied in electrical components, wireless communication, security devices, etc., can solve problems beyond service qualification and scope, and achieve the effect of meeting privacy requirements, ensuring security, and preventing leakage

Active Publication Date: 2012-11-28
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present invention provides an improved solution for supervising IDP authorization services, which is used to solve the problem of IDP disclosing and sharing user identity information without user authorization in the prior art, and providing identity services beyond its service qualification and scope. The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Supervisory method and supervisory entity of authorization service of identify providing entity
  • Supervisory method and supervisory entity of authorization service of identify providing entity
  • Supervisory method and supervisory entity of authorization service of identify providing entity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Functional Overview

[0020] Whether it is in policy design or in actual application, it is necessary to reflect the supervision of IDP authorization services. In order to meet the needs of users and network security, the embodiment of the present invention provides an online supervision measure to ensure the orderly operation of the network. In the embodiment of the present invention, after the network security event information is monitored or received, the information of the network security event is converted into supervision policy parameters according to the preset conversion policy, and then the supervision policy parameters are processed according to the supervision policy to generate Corresponding regulatory instructions are sent to the IDP, instructing the IDP to return the corresponding authorization information. After receiving the authorization information returned by the IDP, according to the authorization information and the monitoring strategy, it is judg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a supervisory method and a supervisory entity of authorization service of an identify providing entity. The supervisory entity comprises an event trigger module and an event processing module, wherein the event trigger module is used for monitoring and receiving network security event information of different types of network security events; and the event processing module is used for sending a supervisory command to an identify providing entity according to the security event information, and corresponds to authorization information returned by the supervisory command according to the identify providing entity to perform authorization examination to the identify providing entity. According to the technical scheme, the current requirement of a user to privacy can be satisfied, therefore, the network security can be guaranteed, and the disclosure of the identify information of the user can be prevented.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method for supervising the authorization service of an identity providing entity and a supervising entity. Background technique [0002] Identity Management (IDM for short) refers to the management of the lifecycle of user identities (that is, the use process) and the relationship between user identities and network application services based on the network and related supporting technologies. For example, authenticate or authorize users accessing applications or resources. The identity provider (Identity Provider, referred to as IDP) is the core of the IDM system. Users use the identity granted by the IDP to access legal network services, and the service provider (Service Provider, referred to as SP) uses the IDP to authenticate the user's identity. , to confirm the legitimacy of the user's identity, thereby establishing a trust relationship between the user and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W24/00H04W12/08
Inventor 吴桂华陈剑勇滕志猛林兆骥
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products