Method for realizing information grading authorized access in presenting service system

A technology of business information and business systems, applied in the field of information hierarchical authorization access, can solve problems such as no further detailed description, and achieve the effect of guaranteeing realization and protecting privacy security

Inactive Publication Date: 2006-06-14
ZTE CORP
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no further detailed description of how to implement hierarchical authorization for different user presence inf

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing information grading authorized access in presenting service system
  • Method for realizing information grading authorized access in presenting service system
  • Method for realizing information grading authorized access in presenting service system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so as to make the technical solution of the present invention and its beneficial effects obvious.

[0032] The method for implementing hierarchical authorization access to information in the presence service system of the present invention realizes a security mechanism for hierarchical authorization access to presence information, and the premise of the description of the method below is that the user and the presence server have successfully completed identity authentication.

[0033] According to the scene where the Presence information takes effect in the actual application, the authorized access process of the present invention can be divided into two stages:

[0034] The first stage is that the user updates his own hierarchical access policy of presence information to the presence server;

[0035] In the second stage, the presence serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a method for realizing information hierarchical authorization access in a presence service system including two steps: a user refreshes its own presence service information hierarchical access strategy to a presence service server, which sends information to the user requiring for obtaining the information based on the strategy set by the user, which can realize the complete Presence information hierarchical authorization access system.

Description

technical field [0001] The invention belongs to the technical field of presence services in future 3G communication services, and in particular relates to a method for hierarchically authorized access to information. Background technique [0002] Presence service is a new type of communication service, which can be called presentation service. It can meet the communication needs of users in two aspects: First, users can express their status to relatives, friends or other users in real time, such as idle status, where they are Location, action plan, emotional state, terminal capabilities, etc.; second, users can obtain real-time status of relatives, friends or other users. [0003] Presence can be described as various status information related to users, and the performance of this status information can greatly enhance and expand existing communication capabilities. By obtaining the Presence information of the other party, the communication initiator can know whether the ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/58
Inventor 熊晓春
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products