Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identity authentication method and system

A user identity authentication and user identity technology, applied in the direction of user identity/authority verification, etc., can solve the problems of network equipment user maintenance difficulties, increase production costs, information security threats, etc., to reduce maintenance difficulties and cumbersomeness, and achieve centralized management. , the effect of enhancing flexibility

Inactive Publication Date: 2012-01-04
ZICT TECH CO LTD
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Today, with the rapid increase of the network and the rapid development of the market, the disadvantages of this management mode are becoming more and more obvious, especially when the new network uses a large number of firewalls, switches, routers, etc., this disadvantage is particularly prominent
In addition, if you want to modify a user's access control policy, you need to modify the policy on each device, which makes it difficult and cumbersome to maintain network device users, which increases production costs and poses a serious threat to information security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method and system
  • User identity authentication method and system
  • User identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer and clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] The invention provides a user identity authentication method, which uniformly stores and records user identity authentication parameters such as user name and password in a unified authentication server, and uniformly authenticates the user's legitimacy when the user logs in to a network device. The method includes:

[0036] Step 1. When the user accesses the network device, the network device sends the authentication request parameters to the unified authentication server; specifically includes:

[0037] Step 1.1, the network device receives au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user identity authentication method, which comprises the following steps of: uniformly storing and recording authentication parameters of user identity into a unified authentication server, and uniformly authenticating the legality of the user identity by using the unified authentication server when a user logs in network equipment. The invention also provides a user identity authentication system. By the user identity authentication method and the user identity authentication system, security-policy-based unified user management and authentication can be realized, the unified authentication of a plurality of pieces of network equipment over the user identity is realized and the maintenance difficulties and complexity of a network equipment manager are reduced simultaneously, thereby reducing production cost and threats to information security.

Description

technical field [0001] The invention relates to the field of information security, in particular to a user identity authentication method and system for network equipment. Background technique [0002] As operators build larger networks, the number of network devices increases rapidly. At present, the user information maintenance of various network devices is maintained by each device. When using the same user to log in to each network device, it is necessary to create the same user on each device. Today, with the rapid increase of the network and the rapid development of the market, the disadvantages of this management mode are becoming more and more obvious, especially when the new network uses a large number of firewalls, switches, routers, etc., this disadvantage is particularly prominent. In addition, if you want to modify a user's access control policy, you need to modify the policy on each device, which makes it difficult and cumbersome to maintain network device use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 黄韶军
Owner ZICT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products