Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Improved sub-tree access control in network architectures

An access control and data request technology, applied in instrumentation, computing, electrical digital data processing, etc., can solve problems such as limiting the flexibility of CSP operation equipment vendors, hardware does not tend to be adjusted economically, and spare capacity blocks cannot be effectively used by CSP.

Inactive Publication Date: 2010-06-23
APERTIO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, CSPs often find themselves "locked" to an equipment vendor that has limited interoperability with other vendors' systems, thereby limiting the CSP's operational flexibility and choice of equipment vendors when upgrades are required
Furthermore, proprietary hardware does not tend to scale economically, often resulting in some spare capacity blocks not being efficiently used by CSPs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved sub-tree access control in network architectures
  • Improved sub-tree access control in network architectures
  • Improved sub-tree access control in network architectures

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Overview

[0046] Traditional mobile telecommunications networks are the result of evolution rather than revolution. As the communications market has evolved, consolidation and acquisition, along with changing business strategies, have resulted in operational and functional data silos within a typical communications service provider (CSP). A typical network arises from a series of functional overlays to a core network built primarily for voice communications. Thus, duplication often exists in user databases, service creation and provisioning processes, administration, support, and billing. Many CSPs want to rationalize and consolidate their businesses to remove this duplication in order to reduce costs, increase efficiency and ultimately improve customer service. At the same time, CSPs often need to add capacity, add functional enhancements, and replace aging infrastructure. In addition, CSPs may also want to prepare for further convergence between voice communicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Access control system in a diretory accessed by a diretory access protocol. The system has a security protocol adaptation module (1215) configured to review a data request from a requesting entity (1203) received in a directory operations server (1213) and to locate a security rule pertaining to the requesting entity. Also, the security protocol adaption module modifies the data request so that the data request appears to originate from one of a first security user (1207) having a read permission or from a second security user (1209) having a read and write permission.

Description

technical field [0001] Embodiments of the invention relate to systems and methods for providing data and services in a network. More specifically, embodiments of the present invention relate to systems and methods that enable durable, high-speed data access for use in communication networks with a large number of users whose respective data can be configured in a centralized data repository for Accessed by various applications operating within the network. Background technique [0002] Mobile and fixed network operators want to transition to a fully converged communications service provider (CSP). The ever-changing business strategies and implementations of new customer services have formed operational and functional silos within a typical CSP. Many traditional communication networks are based on unstructured tinkering efforts to functionally overlay core networks built primarily for voice communications. Data duplication often exists in user databases, service creation a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCG06F21/6218H04L63/101
Inventor K·瓦克菲尔德
Owner APERTIO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products