Unlock instant, AI-driven research and patent intelligence for your innovation.

A user management method, device and unified user management system

A user management and user account technology, applied in the field of communication, can solve problems such as inconsistent user data, high risk of user data, frequent data query operations, etc.

Active Publication Date: 2017-11-14
CHINA MOBILE COMM GRP CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the frequent data query operations between the business system and the user management system, it will take up a lot of system resources
And because user data needs to be carried every time data query is performed, the risk of user data being stolen by hackers is high
[0008] (2) The user management system needs to synchronize user data with each business system, so there may be inconsistencies between the user data in each business system and the user management system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user management method, device and unified user management system
  • A user management method, device and unified user management system
  • A user management method, device and unified user management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Embodiment 1 of the present invention provides a user management method. The user management method provided by the present invention is described from the side of the user management system. The steps of the method can be as follows figure 1 shown, including:

[0043] Step 101, the user management system receives a request for an access tag (ServiceTick) of the authentication service system.

[0044] In this embodiment, the user management system can feed back the user type of the user to the business system, so that the business system can determine the operation authority of the user according to the user type of the user. Specifically, the user management system may carry the user type of the user in the authentication response message to the authentication ServiceTick request.

[0045] Therefore, in this step, the user management system may receive the authentication ServiceTick request sent by the business system, and the authentication ServiceTick request carrie...

Embodiment 2

[0062] Embodiment 2 of the present invention provides a user management device, which can be integrated into the user management system involved in Embodiment 1. The structure of the device can be as follows figure 2 shown, including:

[0063] The receiving module 11 is used to receive the authentication service system access label ServiceTick request sent by the business system, and the authentication ServiceTick request carries the ServiceTick information corresponding to the business system;

[0064] The authentication module 12 is used to authenticate the ServiceTick information, and when the ServiceTick information is authenticated, return an authentication response message to the business system, the authentication response message carries a user identifier and a user type, and the user The identifier is the user identifier corresponding to the ServiceTick information, and the user type is the user type corresponding to the user identifier determined from all user types...

Embodiment 3

[0068] Embodiment 3 of the present invention provides a user management method. The user management method provided by the present invention is described from the side of the business system. The steps of the method can be as follows image 3 shown, including:

[0069] Step 201, the service system receives a service access request.

[0070] In the process of user management, the service system can determine the legitimacy of the user's service access request according to the pre-received user type. There is no need to query the user management system for the user's operation authority every time a service access request is received, thereby reducing the number of queries to the user management system.

[0071] In this step, the service system receives the service access request sent by the user through the browser.

[0072] Step 202, the business system determines the response result.

[0073] In this step, the service system may determine the response result to the service...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a user management method, device, and unified user management system. Multiple user types corresponding to different operation rights can be configured in the business system, and the business system can synchronize all user types configured by itself to the user management system. . The user management system feeds back the user type of the user in the business system to the business system, so that the business system can determine the user's operation authority according to the user type, so as to realize the legality judgment of the user's business access request.

Description

technical field [0001] The invention relates to the communication field, in particular to a user management method, device and unified user management system. Background technique [0002] Currently, user management methods for business systems include a Mobile Agent System (Mobile Agent System, MAS) mode and an Application Data Center (Application Data Center, ADC) mode. [0003] In the MAS mode, the implementation scheme of base plus plug-in is mainly adopted. The user management system as a base only realizes the access management of each business system, but does not realize the management of user data of each business system. Therefore, the system administrator needs to add user data (that is, user account information) and configure user operation permissions on each business system as a plug-in. Each business system is independent of each other and manages users separately. When users need to use multiple business systems, they need to perform login verification on e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24H04L1/16
Inventor 陈云峰陈志刚范晓晖
Owner CHINA MOBILE COMM GRP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More