Method and system for implementing user access control, third-party user server

A user server and access control technology, applied in the field of network information security, can solve the problems of network equipment performance impact, network equipment resource occupation, equipment resource waste, etc., achieve the effect of reducing functional redundancy, increasing the number of users, and avoiding performance impact

Active Publication Date: 2019-04-23
BEIJINGNETENTSEC
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the above access control process, only local network devices are used to maintain the user organizational structure, and user access control capabilities are provided based on the local organizational structure; however, in actual deployment, the user organizational structure is sometimes maintained on a third-party user server. In this scenario, the organizational structure of the local network device and the third-party user server constitutes a large functional redundancy, resulting in a waste of device resources
[0004] At the same time, in the actual use scenarios of large customers, the number of users stored on such third-party user servers will usually be large, generally in the order of tens of thousands; while in traditional implementation methods, the maintenance of the local organizational structure and support for users to go online and offline Actions occupy a large amount of resources of network equipment and become a key performance bottleneck to increase the number of users supported by network equipment
[0005] To sum up, using the existing technology, there is still no effective way to solve the problem of how to remove the functional redundancy between the local network device and the third-party user server, and how to affect the performance of the network device as the number of users continues to increase. solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing user access control, third-party user server
  • Method and system for implementing user access control, third-party user server
  • Method and system for implementing user access control, third-party user server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to understand the characteristics and technical contents of the embodiments of the present invention in more detail, the implementation of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. The attached drawings are only for reference and description, and are not intended to limit the present invention.

[0037] Such as figure 2 As shown, the implementation method flow of user access control in the embodiment of the present invention includes the following steps:

[0038] Step 201: the client determines the third-party user server to be accessed according to the IP address to be accessed, and sends login information to the third-party user server;

[0039] Here, the login information includes user name and password.

[0040] In this step 201, the client determines the third-party user server to be accessed according to the IP address to be accessed, including:

[0041] The domain name cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user access control implementation method. The method includes the following steps that: a client determines a third party server to be accessed according to an IP address to be accessed and sends login information to the third party user server; after successfully authenticating the login information, the third party user server obtains user online information, queries user identities corresponding to online users in the online information and returns the user identities to the client; and the client obtains corresponding access control strategies through matching in local network equipment according to the user identities and starts access control operation corresponding to the access control strategies. The invention also discloses a user access control implementation system and a third party user server.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to a method and system for realizing user access control, and a third-party user server. Background technique [0002] Access control is one of the important foundations of system confidentiality, integrity, availability and legal use, and it is also one of the key strategies for network security prevention and resource protection. Access control provides a basic guarantee for the security of system information and data resources. The so-called access control refers to a means for the system to limit the user's ability to use data resources on the user's identity and the predefined policy group to which it belongs. The user management in the access control process can be divided into three parts: user organization structure, authentication server and policy controller from the perspective of structure; from the division of data flow, it can be divided into IP-t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/105
Inventor 强盛陈鑫
Owner BEIJINGNETENTSEC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products