A method and device for synchronizing authentication information

A technology for authentication information and identity authentication, applied in the field of authentication information synchronization methods and devices, can solve problems such as cumbersome processes, increase authentication pressure of IAM system, etc., and achieve the effect of reducing authentication pressure

Active Publication Date: 2022-04-01
NEW H3C SECURITY TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when a user accesses other application systems in another area or even the same application system, it still needs to complete the authentication process with the IAM system again, which will cause multiple authentications for the same user to access application systems in different areas, the process is cumbersome, and the IAM system is increased. System certification pressure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for synchronizing authentication information
  • A method and device for synchronizing authentication information
  • A method and device for synchronizing authentication information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application.

[0029] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein refers to and includes any and al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application provides a method and device for synchronizing authentication information, which are applied to agent devices in a zero-trust network. The zero-trust network adopts a regional deployment method, each region corresponds to an agent device, and each agent device is configured with a neighbor agent device; the method includes: receiving a user's access request; if the authentication information of the user is locally stored, then using the authentication information to authenticate the user, and allowing the user to access the application system requested by the access request after the authentication is passed; if the local If the user's authentication information is not stored, an authentication request is sent to the IAM system for identity authentication, so that the IAM system completes the identity authentication of the user; the authentication result fed back by the IAM system is received; if the authentication result is passed, the authentication is allowed The user accesses the application system requested by the access request; and the authentication information passed through the authentication is synchronized to the neighbor proxy device of the proxy device. This reduces the authentication pressure on the IAM system.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a method and device for synchronizing authentication information. Background technique [0002] The traditional network security model takes the network boundary as the protection boundary, and usually uses firewalls, DDOS, IPS and other equipment to monitor the traffic at the entrance of the enterprise, and users on business trips or branches use VPN to access the intranet. The intranet environment is considered to be safe. With the continuous advancement of technology, this traditional security system is facing challenges. On the one hand, because the internal network defense measures are often relatively weak, once an attacker breaks into the network boundary, the internal network environment will face risks such as data leakage. On the other hand, with the rise of the microservice architecture, the system composition is evolving from centralized to di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/1095
CPCH04L63/08H04L63/20H04L67/1095H04L63/10H04L63/0281
Inventor 邹文宇
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products