A system and method for authorizing access request

An access request and accessed technology, applied in the transmission system, digital transmission system, data exchange details, etc., can solve the problem of cumbersome and inconvenient authorization operation, and achieve the effect of flexible operation

Active Publication Date: 2008-02-20
HUAWEI TECH CO LTD
View PDF0 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, for the situation shown in the above table, that is, each user has its own specific authority, then the administrator cannot authorize the user by dividing the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for authorizing access request
  • A system and method for authorizing access request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The core idea of ​​the present invention is to forward the access request information and authorization information through the authorization proxy device, so as to achieve the purpose of temporarily authorizing the visitor during the access request, especially the remote access, and effectively overcome the problems existing in the prior art.

[0045] Firstly, the system of the present invention will be described in detail with reference to accompanying drawings 1 and 2 .

[0046] The system for authorizing an access request according to the present invention includes: at least one accessed device, an authorizing device and at least one authorized proxy server, and a connection request management module is set in the accessed device;

[0047] Connection request management module: responsible for obtaining access request information and sending it to the authorized proxy server;

[0048] That is, the connection request management module displays information such as serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The utility model relates to a system and a method which authorize for visiting request, which adopts the technical proposal that: the system comprises at least a visited equipment, at least an authorizing equipment and at least an authorized agent server; wherein, the visited equipment is provided with a manage module of connecting the request; the authorized agency server comprises a transfer module of the visiting solicited information, a transfer module of the authorized information and a management module of the authorized mode. The method of the utility model is that: the visited equipment gets the visiting solicited information of the visiting equipment and sends to the authorized agency server; the visiting solicited information is transferred by the authorized agency server to the authorizing equipment and is fed back to the visited equipment that the authorization is made after the authorizing of the authorizing equipment is received. For the technical proposal, one-time authorizing can be realized for the visiting request using the utility model and the authorizing process becomes simple, flexible and safe.

Description

technical field [0001] The present invention relates to the technical field of access authority management, in particular to a system and method for authorizing access requests. Background technique [0002] With the rapid development of Internet technology, more and more people need to obtain shared resources of external networks through remote access. To achieve remote access, the local computer is required to connect to a host in other geographic locations through remote login. After successful login, the local computer is like a common terminal of the remote host, and can freely use the shared resources allowed on the remote host. [0003] Usually, to achieve remote login, the local computer needs to become a legal user of the remote computer, that is, obtain a specified user name, that is, a login ID and password through registration. During the remote login process, the local computer user is required to enter a user name and password. Only when the user name exists a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/22
CPCH04L12/2812H04L63/10H04L63/0884
Inventor 丁志明
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products