Unlock instant, AI-driven research and patent intelligence for your innovation.
Multi-domain security management method for network management system
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
The technology of a network management system and management method is applied in the field of SDH/MSTP/PTN transmission network to achieve the effect of reducing maintenance work time and reducing work time
Inactive Publication Date: 2013-05-08
武汉众邦领创技术有限公司
View PDF2 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0012] The technical problem to be solved by the present invention is to provide a multi-domain security management method for a network management system. Through this method, the problem of sub-domain and sub-authority control in the network management system is solved, and different rights of different management domains are flexibly assigned to users.
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
example
[0037] Example: logical domain = {NE 1, NE 24, ...}
[0038] 4. User: real user.
[0039] 5. User group: A group of users with the same logical security management domain and the same authority.
[0040] Example: Usergroup = {administrators, system operators, ...}
[0041] By default, user groups include administrator user group, operator user group, observer user group, etc., and users can also customize user groups.
[0042] 6. Permission item: a collection of operation permissions, which can be configured according to the granularity of functions.
[0044] 7. Permission set: a collection of functional permission items assigned to users.
[0045] Example: administrator operation permission set = {network element operation permission item, business operation permission item, ...}
[0046] Among them, the operation item is customized by the system, and the operation item is a collectio...
Embodiment
[0065] In order to provide a network management rights management method, the method solves the domain-specific rights control problem in the network management system, and flexibly assigns different rights of different management domains to users.
[0066]The normal flow process of the present invention is as follows:
[0067] Step 1: Create a logical security domain.
[0068] Step 2: Assign network elements to logical security domains.
[0069] Step 3: Create a collection of operation permissions.
[0070] Step 4: Formulate a permission set for the virtual domain.
[0071] Step 5: Specify the virtual domain and permission set for the user.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides a multi-domain security management method for a network management system, which comprises the following steps of: 1) creating one or more logic security management domains; 2) distributing network elements to corresponding logic security management domains; 3) creating a user group and assigning different users to the user groups; 4) creating an operating rights set; 5) specifying the rights set for the logic security management domains and establishing an association relation of the logic security management domains and the operating rights set; and 6) specifying an association relation of the one or more logic security management domains and the operating rights set for the user group, and finally establishing an association relation of the user group, the logic security management domains and the operating rights set. By the method, a problem of control in different domains by different rights in the network management system is solved, and different rights in different management domains are distributed to the users flexibly.
Description
technical field [0001] The present invention relates to SDH (Synchronous Digital Hierarchy) / MSTP (SDH-based Multi-Service Transmission Platform) / PTN (Packet Transport Network) transmission network, focusing on the decentralized management of network management systems, flexibly controlling user rights, and preventing unauthorized access users to access network resources and network management functions. Background technique [0002] In recent years, with the continuous expansion of the transmission network scale, the transmission network of telecom operators has formed a situation where multiple manufacturers and multiple transmissions coexist. The transmission network management centrally manages equipment of various types and manufacturers, monitors alarms and performance in real time, and configures various network connections and services. Because the transmission network management is centralized management, and the scope of management and the functions realized are mo...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.