Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud security product user management method, device and system and readable storage medium

A security product and user management technology, which is applied in the field of cloud services, can solve problems such as poor system scalability, poor user experience, and inability to meet the new role support of cloud security products, so as to improve management efficiency and simplify implementation logic.

Pending Publication Date: 2021-04-30
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Under the current docking mode, in the role system design of the unified cloud management platform and cloud security product docking mode, the role authorization operation interface of the unified cloud management platform cannot meet the role authorization of cloud security products, which will not only cause the unified cloud management platform The development cost of the cloud security product increases, and it will also cause confusion for the end user during use. The user needs to perform role authorization operations twice, and the user needs to understand the functions of all roles in the cloud security product, and the learning cost of the user increases. The user experience is poor; and the current unified cloud management platform needs to maintain the role information of all cloud security products, which leads to the need for the unified cloud management platform to build in the role information of cloud security products during the docking development stage with cloud security products, which increases the complexity of the system , and the scalability of the system is relatively poor, which cannot meet the support for new roles of cloud security products

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud security product user management method, device and system and readable storage medium
  • Cloud security product user management method, device and system and readable storage medium
  • Cloud security product user management method, device and system and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The core of the present invention is to provide a cloud security product user management method, improve the efficiency of user role information relationship management of cloud security products, and reduce the complexity of user-side operations.

[0057] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0058] At present, the role system of cloud security products is independent of the role system of the unified cloud management platform. Role authorization...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud security product user management method, and the method comprises the following steps that a client for operating a cloud security product is butted with a user authentication interface of a unified cloud management platform, and a user takes the cloud security management platform as an intermediate agent when the client logs in the cloud security product; the user authentication interface provided by the unified cloud management platform is called to obtain the role information in the unified cloud management platform, role mapping is performed on the cloud security management platform according to the role information to obtain the role information on the cloud security product, wherein the cloud security management platform does not need to be in butt joint with the user authentication interface, the user only needs to perform role authorization once on the unified cloud security management platform, the unified cloud management platform does not need to maintain security product role information and supports dynamic configuration of roles, so the user management implementation logic on the cloud security product is simplified, and management efficiency is improved. The invention further discloses a cloud security product user management device and system and a readable storage medium, which have corresponding technical effects.

Description

technical field [0001] The present invention relates to the technical field of cloud services, in particular to a cloud security product user management method, device, system and readable storage medium. Background technique [0002] With the development of cloud computing, more and more users choose to migrate their business to the cloud, and public clouds and private clouds are blooming everywhere. With the increasing maturity of cloud computing, it is more and more convenient for users to migrate their business to the cloud, and the construction cost is getting lower and lower. [0003] The development of cloud computing has also led to the development of cloud security. The cloud computing environment, like the traditional local environment, requires cloud security products to ensure the safe operation of the system, and cloud security products also need to follow the resource elasticity and on-demand allocation principles of cloud computing. Therefore, the current mai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33
CPCG06F21/33
Inventor 张心笛范渊杨勃
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD