System and method for identifying authority using relative inquire

A technology of association query and association relationship, applied in the field of network management, it can solve problems such as clear description of difficult-to-contain relationships, complicated relationships, and difficult to adjust inclusive relationships, so as to reduce workload and improve efficiency.

Inactive Publication Date: 2006-10-25
SHANGHAI HUAWEI TECH CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method also has shortcomings: due to the intricate relationship between the managed objects, it is difficult to fully describe it with the inclusive relationship (for example, for the problem of multi-root o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for identifying authority using relative inquire
  • System and method for identifying authority using relative inquire
  • System and method for identifying authority using relative inquire

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solutions and advantages of the present invention clearer, below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail:

[0028] figure 1 It is a structural schematic diagram of a system for authenticating by using an associated query in the present invention; the system includes an authentication server, a query manager, a database system, an object manager and a graph iterator.

[0029] Among them, the authentication server is a background service program that centrally processes the authentication business logic, which can accept authentication request information from the client (authentication requester), and can perform operations such as login access control, superimposed operation authority control, etc. , and at the same time, it can also perform load balancing in the case of a large number of requests from multiple clients. Wherein, the authentication request infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The system includes following parts: query manager capable of receiving query requests; database system capable of storing data of objects to be mongered; authentication server in use for receiving request information of authentication from client end, and for sending the said information to the query manager; parsing the said information, and creating query statements, the query manager carries out query to the database system; object manager stores associated graph of relation of objects to be mongered; iterator of graph stores prearranged algorithms, which are in use for solving paths in the said associated graph of relation, and returns optimal result to the query manager. The invention also discloses method for carrying out authentication by using associated queries. Using associated graph of relation and root object to carry out authentication, the method possesses features of high efficiency, and easy of modifying associated relation.

Description

technical field [0001] The present invention relates to authority control and management in the field of network management, in particular to a system and method for authenticating by using correlation query in the management of next generation network (Next Generation Networking, NGN). Background technique [0002] Since the softswitch realizes the separation of control and access, and has the characteristics of large capacity, the softswitch system is often deployed across multiple regions to carry out services. When conducting business across regions, new requirements are imposed on business acceptance, operation and maintenance, and rights- and domain-based management is often adopted. [0003] In addition, the functions of the managed objects in the current telecommunication network management system (especially the NGN network management system) are getting stronger and stronger, the configuration data is increasing, and the relationship between configuration data is b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L9/32
Inventor 任宝刚郑增加
Owner SHANGHAI HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products