WO2010149030A1 - Centralized authentication method and system - Google Patents

Centralized authentication method and system Download PDF

Info

Publication number
WO2010149030A1
WO2010149030A1 PCT/CN2010/074260 CN2010074260W WO2010149030A1 WO 2010149030 A1 WO2010149030 A1 WO 2010149030A1 CN 2010074260 W CN2010074260 W CN 2010074260W WO 2010149030 A1 WO2010149030 A1 WO 2010149030A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
mercury
user
role
centralized
Prior art date
Application number
PCT/CN2010/074260
Other languages
French (fr)
Chinese (zh)
Inventor
傅华明
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2010149030A1 publication Critical patent/WO2010149030A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Definitions

  • Concentrated people are concentrating people in the wood domain. This is a centralized method and concentration system in the field of communication.
  • the management system of the background management is mainly composed of configuration management, obstacle management, performance management, management, and full management. It is an important part of the management of the entire management package user role management user mercury management, etc. Child into. It is said that the management of each of the management systems of each degree is high.
  • most of the management systems of each management system that is, the operation of the user and the allocation of resources, give the operation of the operation and resources of the resource village to the user.
  • the user resource village there is a component of the operation and management that is given by the operation village.
  • each of the sets of management models has its own set of management models for each of the various sets of general management, the current focus is on the sheep-like only the centralized users who will manage the users. Each is not controlled.
  • the user set the user's full information in addition to the user) and the information stored in each of the operating customers each receive a mercury command message from the client. Concentrate the operations to form mercury. It is a concentrated collection of highly demanding users who have concentrated on the concentration of all users before they are concentrated.
  • the content of the medium or multiple is presented in a centralized and centralized system of centralized and user-friendly users and users.
  • This aspect of the media proposes a centralized approach.
  • the centralized method includes the following steps: the mercury information collected by the customer in the centralized information, and the mercury information in each concentrated concentration of the mercury information is stored in advance in each of the centralized mercury information phases.
  • the role information of each internal multi-role information is found.
  • the role information of the phase is found.
  • the customer becomes the role information and the customer role information interface.
  • the mercury information is concentrated in a step-by-step manner, each of which results in
  • the results were not completed. If the results are not in the following steps, the customer fails to get the user's mercury.
  • the centralized method is to include the following steps, and the role information of each phase is lost. Including the mercury information in each of the following steps, the customer will Information sets each. Among them, mercury information is packaged for users and users. Role information is packaged with information and/or management. Another aspect of this article proposes a concentration system. Concentrate on the mercury information of the mercury information collected by the customer
  • the role information interface is concentrated in the mercury information collected from the client.
  • the mercury information is collected in advance.
  • the mercury information phase is pre-stored in the interior, and each of the collections is stored in advance.
  • the role information of the phase in the role information is obtained by the client. The focus is on whether the results are not in each of the root results. If the results of the external fruit are not met, the customer will lose the user's mercury. If the role information of each phase is not the same, the customer will lose. Among them, mercury information is packaged for users and users. Role information is manipulated and/or managed.
  • the results were not completed. If the results are not in the following steps, the customer fails to get the user's mercury.
  • the centralized method is to include the following steps, and the role information of each phase is lost.
  • the mercury information is collected by the customer to collect the mercury information in each of the following steps.
  • mercury information is packaged for users and users.
  • Role information is packaged with information and/or management. Assign roles in each configuration and save role information role or role in this article.
  • the user who has the information or the role of each operation and management has the specified action of the role or role.
  • the user information set in each user information set is stored in the user information set and each role set is in the system. Only the place where the user information is saved is concentrated on the roles of each user and each tube.
  • Finding the role of the user The user information and the user's role information can be manipulated by the user in each message of each operation. Otherwise, the user has . Concentrate the user and user information of each 206 user-only information. Hugh’s centralized package customer 202 collects mercury information from the user’s information.
  • the role information of the phase is made by the customer. The focus is on whether the results are not in each of the root results. If the results are not successful, the customer will lose the user's mercury. The role information of each of the external fruits is lost by each customer. Among them, mercury information is packaged for users and users. Role information is packaged with information and/or management. 3 is the flow of the centralized method of the present application. This centralized method of the user step describes the step S302 operation of the customer program mercury interface operation user and mercury command customer mercury each step 5304 each receiving customer mercury first will be the user and to the concentration of each concentration Step 5306: Collecting users to receive user commands in a centralized manner
  • Step S308-S 2 Each user's result is lost or not. Customer's prompt. Otherwise, the command is sent to each user.
  • Step S 4 Concentrate Each received message Specify the user's
  • Each step 53 6-5320 each received a message
  • the user information and the role information will be stored in each of the internal clients. Otherwise, the step S322 will be the result of each customer's message. Otherwise, the interface will be prompted to lose the operation of the customer.
  • Each of the commands is received by each of the operation command command messages, and the user's information is suspended. It is the concentration of AP.
  • step 6 Each ase result is determined as step 6 otherwise step 5 step 5 each AP ase lost Step 6 of this process Search Se e es ) Whether each user of the AP exists Step 7 AP Search Se c es o se
  • Step 9 Each user has a fruit presence in the AP. Step 9 Otherwise, each customer user does not exist in this step. Step 9 Each es AP User Step 0 AP each es o se Each user result results in step 2 Otherwise step steps each customer Step 2: Each role of each user in the Se es es AP Step 3 AP Se es o es Each search result is searched for each role to obtain the role of the user, and the operation and operation steps of each configured role and role 5 If the search fails, Step 4 Step 4 Each customer AP has a user assigned this process. Step 5 Each es) AP Step 6 Internal Message Results Customer Step 7 The customer becomes the customer operation interface.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A centralized authentication method and system are provided in the present invention. The centralized authentication method comprises the following steps: a client end receives the login-authentication information input by a user, and sends the login-authentication information to a centralized authentication server; the centralized authentication server authenticates the login-authentication information; if the authentication succeeds, an authority identifier is sent to a professional-network management server, wherein the authority identifier is prestored in the centralized authentication server and corresponds to the login-authentication information; the information of multiple professional-network management roles prestored in the professional-network management server is searched for the information of the professional-network management role corresponding to the authority identifier; if the information of the professional-network management role corresponding to the authority identifier is found, the client end is notified that the authentication succeeds; the client end initiates the related interface according to the information of the professional-network management role. With the present invention, the centralized authentication of user passwords and user authorities can be easily implemented and deployed in the telecommunication network management system.

Description

集中人正方 集中人正系 木 域 本 涉 通信領域 休 涉 集中 方法和集中 系 。 背景 木 照 管理 e eco a age e e o )的 管理系 主要由配置管理、 障管理、 性能管理、 管理和 全 管理 能 成 全管理是其中的 介重要的部分 全管理包 用戶角色的配置管理 用戶 汞 管理等子 成。 看 管理 各 的 各和 度的增 管系 的 全管理的 得 高 目前 要求大部分的 各的 管系 都 各 的管 理 能 即用戶的 是操作 和資源 分配 將操作 的操作和資源 村 的資源賦予用戶 則 用戶 資源村 中的 有了操作村 賦予的 的 以 到各 能管理 的各 和查詢操作 以 的 以 分力  Concentrated people are concentrating people in the wood domain. This is a centralized method and concentration system in the field of communication. The management system of the background management is mainly composed of configuration management, obstacle management, performance management, management, and full management. It is an important part of the management of the entire management package user role management user mercury management, etc. Child into. It is said that the management of each of the management systems of each degree is high. Currently, most of the management systems of each management system, that is, the operation of the user and the allocation of resources, give the operation of the operation and resources of the resource village to the user. In the user resource village, there is a component of the operation and management that is given by the operation village.
前特 同步 等 以羊 分配 不同的用戶 的 以 到 、 分 和 。 了 強 管理的 全 未 多的 要求 部署了 管系 的集中用戶 全 各 不同的 管系 提 集中 各 中的各 用集中 各  Former special synchronization, etc., to assign different users to , , and . There are not many requirements for strong management. The centralized users who have deployed the management system have different centralized management systems.
全 。 考慮到各 各提 的 各自都 有 套 的 管理模 型 的集中 各 乎 建 套通用的 各 管 的 的分 的 管理模型 所以目前的集中 的是 羊 的 般只是將 管用戶的 集中 用戶的 是由各 管的 各 未控制。 在用戶 集中 中 用戶的 全信息 除了用戶 )和又 信息 保存在 各 的 中 操作 用客戶 汞 各 各 收到客戶端的 汞命令 消息到 集中 各 操作 以成 汞 各 。 是 集中 各 用戶 集中 滿 前 集 中 全 的要求 未 多的高 要求 用戶 的集中 全 。 內容 于以 的 介或多 本 提出了 容易 和部署的 管系 用戶 和用戶 集中 的集中 方法和集中 系 。 本 的 介方面 提出了 集中 方法。 集中 方法包 以下步驟 客戶 收用戶所 的 汞 信息 將 汞 信息 集中 各 集中 各 汞 信息 果 成 則將預先存儲在集中 各 內部的 汞 信息相 的 各 各 預先存儲在 all. Considering that each of the sets of management models has its own set of management models for each of the various sets of general management, the current focus is on the sheep-like only the centralized users who will manage the users. Each is not controlled. In the user set, the user's full information in addition to the user) and the information stored in each of the operating customers each receive a mercury command message from the client. Concentrate the operations to form mercury. It is a concentrated collection of highly demanding users who have concentrated on the concentration of all users before they are concentrated. The content of the medium or multiple is presented in a centralized and centralized system of centralized and user-friendly users and users. This aspect of the media proposes a centralized approach. The centralized method includes the following steps: the mercury information collected by the customer in the centralized information, and the mercury information in each concentrated concentration of the mercury information is stored in advance in each of the centralized mercury information phases.
各 內部的多 角色信息中 相 的 角 色信息 果 找到 相 的 角色信息 通 客戶 成 角色信息 以 客戶 角色信息 相 界面。 其中 在集中 各 汞 信息 以包 以 步驟 集中 各 將 結果 各 以  The role information of each internal multi-role information is found. The role information of the phase is found. The customer becomes the role information and the customer role information interface. In which the mercury information is concentrated in a step-by-step manner, each of which results in
各 結果未 是否 成 。 在 各 結果未 是否 成 以包 以下步驟 果 不成 則 各 通 客戶 失 和用戶 汞。 集中 方法 以包 以下步驟 果 各 不到 相 的 角色信息 則 各 通 客戶 失 。 其中 將 汞 信息 集中 各 以包 以下步驟 客戶 將 汞 信息 各 以 各 將 汞 信息 集中 各 。 其中 汞 信息 以包 用戶 和 。 角色信息 以包 操作 信息和/或管理 。 本 的另 方面 提出了 集中 系 。 集中 系 客戶 于 收用戶所 的 汞 信息 汞 信息 The results were not completed. If the results are not in the following steps, the customer fails to get the user's mercury. The centralized method is to include the following steps, and the role information of each phase is lost. Including the mercury information in each of the following steps, the customer will Information sets each. Among them, mercury information is packaged for users and users. Role information is packaged with information and/or management. Another aspect of this article proposes a concentration system. Concentrate on the mercury information of the mercury information collected by the customer
相 的 角色信息 相 界面 集中 各 于 收未自客戶端的 汞 信息 汞 信息 果 成 則集中 各 汞 信息相 的預先存儲在其內部的 以 各 于 收未自集中 各 的 在預先存儲在其內部的多 角色信息中 相 的 角色信息 果 找到 相 的 角色信息 則通 客戶 成 。 其中 集中 各 于將 結果 各 以 各 于根 結果未 是否 成 。 外 果 各 結果 不成 則 各 于通 客戶 失 和用戶 汞。 果 各 不到 相 的 角 色信息 則 各 通 客戶 失 。 其中 汞 信息 以包 用戶 和 。 角色信息 以 操作 信息和/或管理 。 本 克 了用戶 集中 中 各器中的 模 型和集中 各器中的 模型需要 匹配的 本 提 的 方案是 以 于用戶 中現有的 比 AP 、 或者 ad S ) 因 不管是 是 各 各提 都只要在 未系 的 的 少量的 能 和部署集中用戶 。 明 所 明的 未提 本 的 步理解 成本 的 部 分 本 的示意 其 明 于 本 不 本 的 不 定。 在 中 是 本 介 的集中 方法的流程 2是 本 介 的各 同交互 以The role information interface is concentrated in the mercury information collected from the client. The mercury information is collected in advance. The mercury information phase is pre-stored in the interior, and each of the collections is stored in advance. The role information of the phase in the role information is obtained by the client. The focus is on whether the results are not in each of the root results. If the results of the external fruit are not met, the customer will lose the user's mercury. If the role information of each phase is not the same, the customer will lose. Among them, mercury information is packaged for users and users. Role information is manipulated and/or managed. In this case, the model in each user in the user set and the model in the centralized device need to match the proposed scheme, so that the existing ratio AP or ad S in the user is as long as it is A small number of capable and deployed users. The explanation of the part of the cost of understanding the cost of the unexplained step is clearly stated in the original Not sure. Process 2, which is the centralized method of the present application, is the interaction of the present application.
3是 本 介 的集中 方法的流程 。 方式 下面參考 明本 的 休 方式。 是 本 介 的集中 方法的流程 。 所示 本 的集中 方法包 以下步驟 步驟 02 客戶 收用戶所 的 汞 信息 將 汞 信息 集中 各 步驟 04 集中 各 汞 信息 步驟S 06 果 成 則將預先存儲在集中 各 內部的 汞 信息相 的 各 步驟S 0 預先存儲在 各 內部的多 角色 中 相 的 角色信息 果 找到 相 的 角色信息 則通 客戶 成 以 步驟S 0 客戶 角色信息 相 界面。 相 木中 集中 各 用戶 集中 。 本 中 以用于匹配集中 各器中存儲的 汞 信息 各器中存儲的 角色信息 而 以 客戶端的 汞 信息 得 客戶 取其 角色信息 相 界面 而 客戶端的 。 其中 在集中 各 汞 信息 以包 以 下步驟 集中 各 將 結果 各 以  3 is the process of the centralized method of this book. Modes The following is a reference to the method of rest. It is the process of the centralized method of this book. The centralized method shown in the following steps is carried out in step 02. The customer receives the mercury information from the user. The mercury information is collected in step 04. Each mercury information step S 06 is stored in each step S of the internal mercury information phase. 0 Pre-stored role information in each of the internal multi-role phases. If the role information of the phase is found, then the client enters the customer role information interface with step S 0 . Concentrate on each user in the phase. In this paper, the role information stored in each device is matched with the mercury information stored in each device, and the client's mercury information is used to obtain the user's role information interface and the client. In which the mercury information is concentrated in the following steps, each of which results in
各 結果未 是否 成 。 在 各 結果未 是否 成 以包 以下步驟 果 不成 則 各 通 客戶 失 和用戶 汞。 集中 方法 以包 以下步驟 果 各 不到 相 的 角色信息 則 各 通 客戶 失 。 其中 將 汞 信息 集中 各 以包 以下步驟 客戶 將 汞 信息 各 以 各 將 汞 信息 集中 各 。 其中 汞 信息 以包 用戶 和 。 角色信息 以包 操作 信息和/或管理 。 在 本 的 介 中 在 各 配置和保存 角色信息 角色 或者角色 )分配 介角色 The results were not completed. If the results are not in the following steps, the customer fails to get the user's mercury. The centralized method is to include the following steps, and the role information of each phase is lost. In the following steps, the mercury information is collected by the customer to collect the mercury information in each of the following steps. Among them, mercury information is packaged for users and users. Role information is packaged with information and/or management. Assign roles in each configuration and save role information role or role in this article.
角色信息中 以包含各 操作 和管理 的 信息 了 角色 或者角色 ) 的用戶具有 角色 或者角色 ) 的 指 定 的操作 保存用戶信息 集中 各 保 存用戶信息 集中 各 用戶有 介 的 和各 的角色 集中 各 是系 中唯 保存用戶 信息的地方 集中 各 它 用 和各 管的角色  In the role information, the user who has the information or the role of each operation and management has the specified action of the role or role. The user information set in each user information set is stored in the user information set and each role set is in the system. Only the place where the user information is saved is concentrated on the roles of each user and each tube.
的 各 集中 各 的 找到 的角色 而 。 集中 各 的 以理 解力集中 各 的用戶的分 P信息 介分 有 介分 分 和 各 的角色 。 2是 本 介 的集中 系 的各 同交互 。 2所示 本 的集中 的方法包 以下 休 客戶 202 提 汞界面 收 操作 的用戶 和 信息 消息 各 界面。 各 204 存 角色信息 各 收到客戶端的 消息 首先 用戶 到集中 各 在 用戶 妳到集中 各 取用戶 的 Each of the concentrated roles found. The sub-P information of each user who is concentrated in understanding is divided into points and roles. 2 is the same interaction of the centralized system of the present. The centralized method shown in Figure 2 includes the user and information message interfaces of the customer 202. Each of the 204 role information is received by the client. In the user's reach to the centralized user
找到 本身的角色 將用戶信息和用戶 的角色信息 在 各 內 操作 止各操作的 各 消息中提 的用戶 才能 操作 否則 用戶 有 。 集中 各 206 唯 存 用戶 全信息 收 管的用戶 和 用戶 信息。 休 的集中 系 包 客戶 202 于 收用 戶所 的 汞 信息 將 汞 信息 集中 各  Finding the role of the user The user information and the user's role information can be manipulated by the user in each message of each operation. Otherwise, the user has . Concentrate the user and user information of each 206 user-only information. Hugh’s centralized package customer 202 collects mercury information from the user’s information.
相 的 角色信息 相 界面 集中 各 206 于 汞 信息 果 成 則集中 各 將 汞 信息相 的預先存儲在其內部的 各 以 各 204 于在預先存儲在其內部的多 角色 信息中 相 的 角色信息 果 找到  The phase information of the phase interface is concentrated in each of the mercury information, and each of the mercury information phases is pre-stored in each of the internal role information of each of the plurality of role information stored in the multi-role information stored in advance.
相 的 角色信息 則 通 客戶 成 。 其中 集中 各 于將 結果 各 以 各 于根 結果未 是否 成 。 果 各 結果 不成 則 各 于通 客戶 失 和用戶 汞。 外 果 各 不到 相 的 角 色信息 則 各 通 客戶 失 。 其中 汞 信息 以包 用戶 和 。 角色信息 以包 操作 信息和/或管理 。 3是 本 介 的集中 方法的流程 。 本 的集中 方法的 休用戶 步驟描述 下 步驟S302 操作 客戶 用程序 汞界面 操作 用戶 和 汞命令客戶 汞 各 步驟5304 各 收到客戶 汞 首先將用戶 和 到集中 各 集中 步驟 5306 集中 各 收到用戶 命令 用戶 The role information of the phase is made by the customer. The focus is on whether the results are not in each of the root results. If the results are not successful, the customer will lose the user's mercury. The role information of each of the external fruits is lost by each customer. Among them, mercury information is packaged for users and users. Role information is packaged with information and/or management. 3 is the flow of the centralized method of the present application. This centralized method of the user step describes the step S302 operation of the customer program mercury interface operation user and mercury command customer mercury each step 5304 each receiving customer mercury first will be the user and to the concentration of each concentration Step 5306: Collecting users to receive user commands in a centralized manner
結果 步驟 S308-S 2 各 收到用戶 結果 是否 成 果失 客戶 客戶 提示 否則 命令到 中 各 取用戶的 步驟S 4 集中 各 收到消息 指定用戶的  Result Steps S308-S 2 Each user's result is lost or not. Customer's prompt. Otherwise, the command is sent to each user. Step S 4 Concentrate Each received message Specify the user's
各 步驟 53 6-5320 各 收到 消息  Each step 53 6-5320 each received a message
各 存在 的角色 或者角色 ) 果存在則將用戶信息和 的角色信息存 在 各 的內 客戶 成 否則 失 步驟S322 客戶 各 的消息 果 成 則 各界面 否則提示操作 失 下未 客戶 汞成 操作 相 各操作 操作命令 各 各 收到 各操作命令 命令消息中的用戶信息 休命令 操作的 休 果 則 各 下 面的 否則 客戶 用戶 。 是 于 AP 的 集中 。  If there is any existing role or role, the user information and the role information will be stored in each of the internal clients. Otherwise, the step S322 will be the result of each customer's message. Otherwise, the interface will be prompted to lose the operation of the customer. Each of the commands is received by each of the operation command command messages, and the user's information is suspended. It is the concentration of AP.
由操作 通 管系 到 AP 各 e eco ) 。 休 步驟 下 步驟 操作 客戶 汞界面 用戶 和 步驟2 客戶 汞命令到 各 步驟3 各 d e es ) AP 各 述集中 各 ) ase 步驟4 AP 各 d es o se  From the operating system to the AP e eco ). Steps Steps Steps Operation Customer Mercury Interface User and Step 2 Customer Mercury Command to Step 3 Each d e es ) AP Each Set) ase Step 4 AP Each d es o se
各 ase 結果 果 定成 步驟6 否則 步驟5 步驟5 各 AP 各 ase 失 本 流程 步驟6 各 搜索 Se e es ) AP 各 用戶是否存在 步驟7 AP 各 搜索 Se c es o se Each ase result is determined as step 6 otherwise step 5 step 5 each AP ase lost Step 6 of this process Search Se e es ) Whether each user of the AP exists Step 7 AP Search Se c es o se
各 用戶在 AP 各 是否存在 果存在 步驟9 否 則 步驟 步驟 各 客戶用戶不存在 本 流程 步驟9 各 d e es A P 各 用 戶 步驟 0 AP 各 d es o se 各 用戶 結果 果 成 步驟 2 否則 步驟 步驟 各 客戶 本 流程 步驟 2 各 Se c e es AP 各 用戶所 的角色 步驟 3 AP 各 Se c es o se 各 搜索結果 果搜索成 各 以得到用戶所 的角色 而 以 到 各 配置的角色和角色 的操作 和操作 然 步驟 5 果搜索失 步驟 4 步驟 4 各 客戶 AP 各 用戶 有分配 本 流程 步驟 5 各 d e es ) AP 各 步驟 6 各 內部消息 結果 客戶 步驟 7 客戶 成 客戶 操作界面。 在本 的 中 克 了用戶 集中 中 各器中 的 模型和集中 各器中的 模型需要 匹配的 本 的 方案是 以 于用戶 中現有的人正 、 比 AP 、 或者 ad s ) 因 不管是 是 各 各提 都只要在 未系 的 的 少量的 能 和部署集中用戶 。 以 力本 的 而已 不用于 制本 于本領域 的 木 未 本 以有各 更 和文 。 凡在本 的精神和 所作的 何修 、 等同替換、 等 包含在本 的保 內。 Each user has a fruit presence in the AP. Step 9 Otherwise, each customer user does not exist in this step. Step 9 Each es AP User Step 0 AP each es o se Each user result results in step 2 Otherwise step steps each customer Step 2: Each role of each user in the Se es es AP Step 3 AP Se es o es Each search result is searched for each role to obtain the role of the user, and the operation and operation steps of each configured role and role 5 If the search fails, Step 4 Step 4 Each customer AP has a user assigned this process. Step 5 Each es) AP Step 6 Internal Message Results Customer Step 7 The customer becomes the customer operation interface. In this book, the model in each device in the user set and the model in the centralized device need to match the book. The solution is that the existing people in the user are positive, than AP, or ad s) because the user is concentrated in a small amount of energy and deployment, regardless of whether they are each. It is not used to make the wood in this field. Everything in this spirit and what is done, equivalent replacement, etc. are included in this warranty.

Claims

要 求 集中 方法 其特 在于 包 以下步驟 Require a centralized method, which is characterized by the following steps
客戶 收用戶所 的 汞 信息 將所述 汞 信息 集中 各  The customer receives the mercury information from the user, and concentrates the mercury information.
所述集中 各 所述 汞 信息  The concentration of each of the mercury information
果 成 則將預先存儲在所述集中 各 的 所述 汞 信息相 的 各  The result will be pre-stored in each of the mercury information phases in the set.
所述 各 預先存儲在所述 同 各 的多 角色信息中 所述 相 的 角色信息 果 找到 所 相 的 角色信息 則通 所述客 戶 成 所述 角色信息  And the role information of each of the phases stored in the plurality of role information in advance is found to be the role information of the phase, and the role information is obtained by the client.
所述客戶 所述 角色信息 相 界面。  The customer described the role information interface.
要求 所述的集中 方法 其特 在于 在所述集中 各 汞 信息 包括以下步驟  The centralized method described is characterized in that the mercury information in the concentration includes the following steps
所述集中 各 將 結果 所述 同 各 以 所述 各 所述 結果未 是否 成 。  Each of the sets will result in the same result as the respective results.
要求2所述的集中 方法 其特 在于 在所述  The centralized method of claim 2, characterized in that
各 所述 結果未 是否 成 包 以下步驟 果 不成 則所述 各 通 所述客戶 失 和用戶 汞。  Each of the results is not packaged. If the following steps are not completed, the customer is lost and the user mercury is lost.
要求 所述的集中 方法 其特 在于 包 以下步驟 果所述 各 不到 所述 相 的 角色信息 則所述 各 通 所述客戶 失 。 5 要求 至4中 項所述的集中 方法 其特 在于 將所 述 汞 信息 集中 各 包 以下步驟 The centralized method is required to be characterized in that, in the following steps, the role information of each phase is not described, and the respective customers are lost. 5 The centralized method described in the requirements of item 4 is characterized in that the mercury information is grouped into the following steps.
所述客戶 將所述 汞 信息 所述 同 各 以 所述 各 將所述 汞 信息 所述集中 各 。 6 要求5所述的集中 方法 其特 在于 所述 汞 信息 包 用戶 和 。 7 要求5所述的集中 方法 其特 在于 所述 角色 信息包 操作 信息和/或管理 。 集中 系 其特 在于 包括  The customer centralizes the mercury information as described in the respective mercury information. 6 The centralized method described in claim 5 is characterized by the mercury information package user and . 7 The centralized method of claim 5 is characterized by the role information package operation information and/or management. Concentration is characterized by
客戶 于 收用戶所 的 汞 信息 所述 汞 信息 相 的 角色信息 相 界面 集中 各 于 收未自所述客戶端的 汞 信息 所 汞 信息 果 成 則所述集中 各 所述 汞 信息相 的預先存儲在其內部的 以 各 于 收未自所述集中 各 的所述又 在預先存儲在其內部的多 角色信息中 所述 相 的 角色信息 果 找到 所述 相 的 角色信息 則通 所述客戶 成 。 9 要求8所述的集中 系 其特 在于 所述集中 各 于將 結果 所述 同 各 以 所述 各 于根 所述 結果未 是否 成 。 0 要求9所述的集中 系 其特 在于 果所述  The role information interface of the mercury information phase of the customer's mercury information is collected in the mercury information of the mercury information collected from the client, and the mercury information phase is pre-stored in the centralized The character information of the phase is found by the role information of the phase in the multi-role information stored in the multi-role information stored in the collection. 9 The concentration system described in claim 8 is characterized in that the set is different from the result of the result, and the result is not formed by the respective roots. 0 that the concentration described in claim 9 is characterized by
各 所述 結果 不成 則所 各 于通 所述客戶 失 和用戶 汞。 要求8所述的集中 系 其特 在于 果所述 各 不到 所述 相 的 角色信息 則所述 各 通 所述客戶 失 。 要求8至 1中 項所述的集中 系 其特 在于 所述 汞 信息包 用戶 和 。 Each of the results is not consistent with the customer's loss of user mercury. The concentration system described in claim 8 is characterized in that the role information of each of the phases is not described. The concentration described in the requirements of items 8 to 1 is characterized by the mercury information package user and.
要求8至 1中 項所述的集中 系 其特 在于 所述 角色信息包 操作 信息和/或管理 。  The concentration described in the requirements of items 8 to 1 is characterized by the role information package operation information and/or management.
PCT/CN2010/074260 2009-06-23 2010-06-22 Centralized authentication method and system WO2010149030A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910150253.6 2009-06-23
CN200910150253.6A CN101931613B (en) 2009-06-23 2009-06-23 Centralized authenticating method and centralized authenticating system

Publications (1)

Publication Number Publication Date
WO2010149030A1 true WO2010149030A1 (en) 2010-12-29

Family

ID=43370541

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/074260 WO2010149030A1 (en) 2009-06-23 2010-06-22 Centralized authentication method and system

Country Status (2)

Country Link
CN (1) CN101931613B (en)
WO (1) WO2010149030A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102307097A (en) * 2011-09-02 2012-01-04 深圳中兴网信科技有限公司 User identity authentication method and system
CN106452772A (en) * 2016-11-16 2017-02-22 华为技术有限公司 Terminal authentication method and device
CN109274681A (en) * 2018-10-25 2019-01-25 深圳壹账通智能科技有限公司 A kind of information synchronization method, device, storage medium and server

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011144071A2 (en) * 2011-05-24 2011-11-24 华为技术有限公司 Method, device and system for processing domain user authority information
CN102291258A (en) * 2011-07-28 2011-12-21 南京中兴软创科技股份有限公司 Centralized authentication method for telecom support system
CN103856451A (en) * 2012-11-30 2014-06-11 英业达科技有限公司 Cloud-based login management system and method thereof
CN107077128B (en) * 2014-09-15 2019-07-26 Abb瑞士股份有限公司 Control the real world objects in industrial plants
CN105959303B (en) * 2016-03-23 2019-03-12 四川长虹电器股份有限公司 A kind of information safety system and information security method
CN106302483B (en) * 2016-08-19 2019-09-27 上海帜讯信息技术股份有限公司 Decentralized management method and system
CN108023858B (en) * 2016-11-02 2019-03-01 视联动力信息技术股份有限公司 A kind of view networking network management safety certifying method and its system
CN106685955B (en) * 2016-12-28 2020-08-25 武汉微创光电股份有限公司 Radius-based video monitoring platform security authentication method
CN107943069A (en) * 2017-10-26 2018-04-20 北京春鸿科技有限公司 UAV Flight Control and date storage method and system based on cloud storage technology
CN109885989A (en) * 2018-12-29 2019-06-14 航天信息股份有限公司 A kind of method and system carrying out user authority management based on encryption lock
CN112115463A (en) * 2019-06-20 2020-12-22 深圳迈瑞生物医疗电子股份有限公司 Medical monitoring system, patient information access method thereof and storage medium
CN115150105A (en) * 2022-09-01 2022-10-04 杭州悦数科技有限公司 Identity authentication method and system in distributed graph database

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006001587A1 (en) * 2004-03-24 2006-01-05 Exers Technologies. Inc. Network management system and network management server of co-operating with authentication server
CN101018155A (en) * 2007-02-08 2007-08-15 华为技术有限公司 Network element management method, system and network element
CN101227477A (en) * 2008-02-01 2008-07-23 中兴通讯股份有限公司 Method for implementing subscriber terminal access authentication

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1812403A (en) * 2005-01-28 2006-08-02 广东省电信有限公司科学技术研究院 Single-point logging method for realizing identification across management field
CN100502307C (en) * 2006-02-21 2009-06-17 华为技术有限公司 Integrated user safety management method and device
CN100586066C (en) * 2006-06-26 2010-01-27 北京金山软件有限公司 System and method for realizing single-point login
CN101159557B (en) * 2007-11-21 2010-09-29 华为技术有限公司 Single point logging method, device and system
CN101197711B (en) * 2007-12-06 2012-04-04 华为技术有限公司 Method, device and system for implementing unified authentication management
CN101286843B (en) * 2008-06-03 2010-08-18 江西省电力信息通讯有限公司 Single-point login method under point-to-point model

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006001587A1 (en) * 2004-03-24 2006-01-05 Exers Technologies. Inc. Network management system and network management server of co-operating with authentication server
CN101018155A (en) * 2007-02-08 2007-08-15 华为技术有限公司 Network element management method, system and network element
CN101227477A (en) * 2008-02-01 2008-07-23 中兴通讯股份有限公司 Method for implementing subscriber terminal access authentication

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102307097A (en) * 2011-09-02 2012-01-04 深圳中兴网信科技有限公司 User identity authentication method and system
CN106452772A (en) * 2016-11-16 2017-02-22 华为技术有限公司 Terminal authentication method and device
CN109274681A (en) * 2018-10-25 2019-01-25 深圳壹账通智能科技有限公司 A kind of information synchronization method, device, storage medium and server

Also Published As

Publication number Publication date
CN101931613B (en) 2014-12-10
CN101931613A (en) 2010-12-29

Similar Documents

Publication Publication Date Title
WO2010149030A1 (en) Centralized authentication method and system
US8578034B2 (en) Optimized network device discovery
EP1805640B1 (en) Method and apparatus for selection of authentication servers based on the authentication mechanisms in supplicant attempts to access network resources
WO2011113372A1 (en) Method, system and group server for synchronizing operations of multiple groups
WO2016173189A1 (en) Smart household control method, device and system
US9191378B2 (en) Communication apparatus and communication method
CN104837147B (en) The configuration method and system of wireless access points
US9152441B2 (en) Systems and methods involving virtual machine host isolation over a network via a federated downstream cluster
WO2015192562A1 (en) Communication system, access authentication method and system based on communication system
CN106357486A (en) Access method and device for network users
WO2012155615A1 (en) Method, system and related apparatus for implementing rfid network management
CA2543300A1 (en) On demand session provisioning of ip flows
CN108234607B (en) File distribution method and system based on micro-service architecture mode
CN104219100A (en) Information acquiring method and device
WO2012041029A1 (en) Method and device for server processing service
CN111770123B (en) Communication method, apparatus and storage medium
WO2014206354A1 (en) Method, device and system for establishing traffic engineering label switch path
CN101267405A (en) Instant communication monitoring method and system
CN107920139A (en) A kind of confirmation method of domain name, system, equipment and computer-readable recording medium
WO2009121269A1 (en) Method for representing user information in an instant messaging, instant messaging system and device
CN108933724A (en) A kind of information sharing method and system, terminal and server
CN106034048B (en) A kind of method and device of information configuration
CN106533700B (en) Method and device for realizing interface function
CN105681399B (en) Business card acquisition methods and device
TWI474731B (en) Wimax client and mothed for setting parameters of wimax client

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10791536

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10791536

Country of ref document: EP

Kind code of ref document: A1