Unlock instant, AI-driven research and patent intelligence for your innovation.

Authorization management method and device, equipment and storage medium

A technology of authorization management and equipment, applied in the field of data security, can solve problems such as increasing user operating costs, consuming labor and time costs, waste, etc., to reduce operation and maintenance manpower and time costs, improve authorization management efficiency, and avoid idleness and waste Effect

Pending Publication Date: 2022-02-08
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional branch networking and security protection require the purchase of security modules on client devices, requiring operation and maintenance personnel to devote a lot of energy to individually authorize and maintain each device, but users cannot centrally perform authorized dynamic adjustments on all client devices , consumes a lot of labor and time costs, and cannot recycle authorization in the case of business changes. There are a large number of idle and wasteful payment functions on authorized client devices, which increases the user's operating costs and the authorization management efficiency is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization management method and device, equipment and storage medium
  • Authorization management method and device, equipment and storage medium
  • Authorization management method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to more clearly understand the above objects, features and advantages of the present disclosure, the solutions of the present disclosure will be further described below. It should be noted that, in the case of no conflict, the embodiments of the present disclosure and the features in the embodiments can be combined with each other.

[0022] In the following description, many specific details are set forth in order to fully understand the present disclosure, but the present disclosure can also be implemented in other ways than described here; obviously, the embodiments in the description are only some of the embodiments of the present disclosure, and Not all examples.

[0023] figure 1 is a schematic diagram of an authorization system provided by an embodiment of the present disclosure, and the authorization system includes at least one centralized controller and at least one client device ( figure 1 exemplifies a centralized controller and multiple client dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to an authorization management method and device, equipment and a storage medium, and the method comprises the steps: receiving an authorization change instruction for client equipment through a centralized controller, and enabling the authorization change instruction to comprise authorization change information; based on the information of the currently managed residual resources and the authorization change information, performing authorization change verification by the centralized controller; and if the verification is passed, the centralized controller generating an authorization file based on the authorization change information, and sending the authorization file to the client device. According to the embodiment of the invention, the centralized controller carries out the dynamic change and recovery of authorization on all client devices in a centralized manner, avoids the idling and waste of a large number of payment functions, reduces the operation and maintenance manpower and time cost, and improves the authorization management efficiency.

Description

technical field [0001] Embodiments of the present disclosure relate to the technical field of data security, and in particular, to an authorization management method, device, device, and storage medium. Background technique [0002] In the information age, the huge network scale and its complex structure make the complexity of connected devices higher and higher, and the speed of business changes is also faster and faster. The operation and maintenance requirements of branch devices are becoming more and more agile. [0003] Traditional branch networking and security protection require the purchase of security modules on client devices, requiring operation and maintenance personnel to devote a lot of energy to individually authorize and maintain each device, but users cannot centrally perform authorized dynamic adjustments on all client devices , consumes a lot of labor and time costs, and cannot recycle authorization in the case of business changes. There are a large numbe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/10H04L63/108
Inventor 田静伟姚竞聪
Owner BEIJING TOPSEC NETWORK SECURITY TECH