Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication and certification method and system

An authentication method and business method technology, applied in transmission systems, electrical components, etc., can solve the problems of insufficient fine-grained permission processing, no security verification on the server side, and insufficient security.

Inactive Publication Date: 2011-07-20
DATANG MOBILE COMM EQUIP CO LTD +1
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] It can be seen from the above that the existing technology has the following disadvantages: fine-grained authority processing is insufficient; the server does not perform corresponding security checks, and the security is not enough. Users can communicate with operators without using the client provided by the operator. The provided server communicates, thus bypassing the security check of the client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and certification method and system
  • Authentication and certification method and system
  • Authentication and certification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0041] figure 2 is a flowchart showing the authentication and authentication method according to the present invention.

[0042] refer to figure 2 , the authentication and authentication method according to the present invention includes: step S202, pre-configuring the authority model and configuration file, wherein the authority model is used to define authority data storage; step S204, when the client calls the business method of the server, the server Models and configuration files are authenticated and authenticated.

[0043] image 3 is a block diagram showing the structure of the authentication and authentication system according to the present invention.

[0044] refer to image 3, the authentication and authentication system 30 according to the present invention includes: authority model configuration means 302, used to pre-configure the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication and certification method and system. The authentication and certification method comprises the following steps that: an authority model and configuration files are configured in advance, wherein the authority model is used for defining authority data storage; and when a client end calls the service method of a server end, the server performs certification and authentication according to the authority model and the configuration files. The technical scheme of the invention can support fine grain authority control, and simultaneously can realize pluggable authority control in an aspect oriented programming (AOP) mode at the server end.

Description

technical field [0001] The invention relates to the communication field, in particular to authentication and authentication methods and systems. Background technique [0002] OMC (operation maintenance center, referred to as OMC) may be subject to the following security threats due to the use of client and server architectures: masquerading, an entity masquerading as an OMC client to perform an operation request; eavesdropping, Security data is eavesdropped; unauthorized access, the server's resources are accessed by the client without authorization; loss or damage, a large amount of data transferred is lost or damaged; denial, the user denies that it has performed an operation; and forgery and rejection Serve. In addition, attacks can come from within the network, such as disgruntled employees, or from outside the network, such as hackers. [0003] In the current OMC system, camouflage and unauthorized access cannot be well controlled. The main reason is: in OMC, the user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 宋志刚林艺廖军
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products