[go: up one dir, main page]

CN106656566B - Third-party data source authentication network-accessing management method based on LDAP protocol - Google Patents

Third-party data source authentication network-accessing management method based on LDAP protocol Download PDF

Info

Publication number
CN106656566B
CN106656566B CN201611014996.7A CN201611014996A CN106656566B CN 106656566 B CN106656566 B CN 106656566B CN 201611014996 A CN201611014996 A CN 201611014996A CN 106656566 B CN106656566 B CN 106656566B
Authority
CN
China
Prior art keywords
employee account
employee
account
flow
root domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611014996.7A
Other languages
Chinese (zh)
Other versions
CN106656566A (en
Inventor
董林莲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huzhou Yinglie Intellectual Property Operation Co ltd
Original Assignee
Phicomm Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Phicomm Shanghai Co Ltd filed Critical Phicomm Shanghai Co Ltd
Priority to CN201611014996.7A priority Critical patent/CN106656566B/en
Publication of CN106656566A publication Critical patent/CN106656566A/en
Application granted granted Critical
Publication of CN106656566B publication Critical patent/CN106656566B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/02Protocol performance

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a third-party data source authentication network-accessing management method based on an LDAP protocol, which is applied to a cloud network management platform, wherein the cloud network management platform is managed based on service set identification and comprises the following steps that S1) the cloud network management platform carries out hierarchical management on employee accounts through the service set identification; s2), allowing the employee account to connect with the local area network of the service set identification management by the cloud network management platform; s3) when the employee account is connected with the local area network; and the cloud network management platform performs authentication management on the employee account. The invention also discloses a third-party data source authentication network-accessing management system based on the LDAP protocol.

Description

Third-party data source authentication network-accessing management method based on LDAP protocol
Technical Field
The invention relates to the field of communication, in particular to a third-party data source authentication internet access management method and system based on an LDAP protocol.
Background
LDAP is a Lightweight Directory access protocol, generally referred to as LDAP for short, and is known as Lightweight Directory access protocol. The objective of LDAP birth is to respond quickly and to query in large capacity and to provide the information replication function of a multi-directory server, which is specially optimized for read-intensive operations, LDAP is based on the Internet protocol and runs directly on a simple and general TCP/IP or other reliable transport protocol layer, so that the establishment of connections and the processing of packets are simple and quick, and it is very convenient for the application of the Internet and enterprise networks.
The LDAP server may be any one of the open source code or commercially available LDAP directory servers (or possibly a relational database with LDAP interfaces) because the same protocol, client connection software packages and query commands may be used to interact with the LDAP server, the entries in LDAP are organized and stored in a tree structure, and the basic model of LDAP is based on "entries" (Entry). An entry is a collection of one or more attributes and has a globally unique "distinguishable name" (denoted by dn). According to different implementation systems, the LDAP protocol implementation mainly comprises openldap based on a linux system and Active Directory based on a windows system.
How to implement third-party data source authentication network management using the LDAP protocol is a topic that needs to be researched at present.
Disclosure of Invention
The purpose of the invention is: providing a third-party data source authentication network access management method based on an LDAP protocol, so as to realize the authentication network access management by using the third-party data source based on the LDAP protocol, and to increase, delete and update the network access duration or the flow of a domain account or a leaf node thereof; the domain account or the leaf nodes thereof are managed in a grading way, so that the account of the leaf nodes under the upper-level child nodes can be synchronously managed without managing each leaf node.
The technical scheme for realizing the purpose is as follows: a third-party data source authentication network-accessing management method based on LDAP protocol is applied to a cloud network management platform which is managed based on service set identification and is characterized by comprising the following steps,
s1) the cloud network management platform carries out hierarchical management on employee accounts through service set identification;
s2), allowing the employee account to connect with the local area network of the service set identification management by the cloud network management platform;
s3) when the employee account is connected with the local area network; and the cloud network management platform carries out authentication management on the employee account.
In an embodiment of the present invention, the step S1) includes the following steps:
s11), establishing a root domain, and configuring the employee account under the root domain;
s12) configuring the internet surfing time length or the traffic of the root domain.
In an embodiment of the present invention, the step S12) is followed by the following steps,
s13), establishing a leaf node under the root domain, wherein the leaf node comprises a plurality of organization units and configures employee account numbers under the leaf node;
s14) configuring the internet surfing time or traffic of each organization unit in the leaf node.
In an embodiment of the invention, the organization unit in the step S13) includes
The ordinary user unit is used for managing the employee account under the ordinary user unit and distributing the internet surfing duration or flow of the employee account, and the internet surfing duration or flow of the employee account is obtained from the nearest leaf node;
the independent unit is used for managing the employee accounts under the independent unit and allocating duration or flow of the employee accounts, and the duration or flow of the employee accounts is allocated by the cloud network management platform independently;
and the third unit is used for managing the employee account numbers in the third unit and distributing the duration or the flow of the employee account numbers, and the duration or the flow of the employee account numbers is obtained by the root domain.
In an embodiment of the present invention, the step S3) includes the following steps,
s31) authenticating the employee account;
s32), when the employee account passes the authentication, the employee account obtains the internet surfing duration or flow; when the employee account cannot pass the authentication, the employee account cannot acquire the internet surfing duration or the internet surfing flow.
In an embodiment of the present invention, after the employee account authentication in step S32) is passed,
when the employee account belongs to the root domain, the internet surfing duration or the internet surfing flow of the employee account is obtained by the root domain;
when the employee account belongs to the common user unit, the internet surfing duration or the internet surfing flow of the employee account is obtained from the leaf node according to the recent principle;
when the employee account belongs to the third unit, the internet surfing duration or the internet surfing flow of the employee account is obtained by the root domain;
and when the employee account belongs to the independent unit, the internet surfing duration or the flow of the employee account is configured independently.
In an embodiment of the present invention, the step S1) further includes the following steps,
s15) deleting the root domain or the leaf node: and when the root domain or the leaf node is deleted, simultaneously deleting the account numbers in all the leaf nodes derived from the root domain or the leaf node.
In an embodiment of the present invention, the step S1) further includes the following steps,
s16), updating the root domain or the leaf node, and deleting the account numbers in all the leaf nodes derived from the root domain or the leaf node after the root domain or the leaf node is updated.
Another object of the invention is: a third-party data source authentication network-surfing management system based on an LDAP protocol is provided.
The technical scheme for realizing the purpose is as follows: a third-party data source authentication network access management system based on an LDAP protocol is characterized by comprising a cloud network management platform and a service set identification management module, wherein the service set identification management module is used for managing employee accounts and comprises network access authentication of the employee accounts.
Further, the service set identifier management module is further configured to establish a root domain and leaf nodes under a root domain account in a hierarchical manner, where the leaf nodes include a plurality of organization units, and the organization units include a common user unit, an independent unit, and other units; and the root domain and the leaf nodes are configured with different internet surfing time lengths or different internet surfing flows.
The invention has the advantages that: the third-party data source authentication internet access management method and system based on the LDAP protocol are used for realizing authentication internet access management by using the third-party data source based on the LDAP protocol, and increasing, deleting and updating the internet access duration or the flow of a domain account or a leaf node thereof; the domain account or the leaf nodes thereof are managed in a grading way, so that the account of the leaf nodes under the upper-level child nodes can be synchronously managed without managing each leaf node.
Fig. 1 is a schematic block diagram of an internet access management system according to an embodiment of the present invention.
Fig. 2 is a flowchart of steps of an authentication internet access management method according to embodiment 1 of the present invention.
Fig. 3 is a flowchart of steps of an authentication internet access management method according to embodiment 2 of the present invention.
Fig. 4 is a service set identification management root domain hierarchy diagram according to embodiment 2 of the present invention.
Fig. 5 is a flowchart of steps of an authentication internet access management method according to embodiment 3 of the present invention.
Wherein, 1, the cloud network management platform; 11 the service set identifies the management module.
Detailed Description
The following description of the embodiments refers to the accompanying drawings for illustrating the specific embodiments in which the invention may be practiced.
Embodiment 1, as shown in fig. 1 and fig. 2, a third-party data source authentication internet access management method based on an LDAP protocol is based on a cloud network management platform, and the cloud network management platform is managed based on a service set identifier. The service set identifier sets different SSIDs for a plurality of wireless Access Points (APs) (access points), and requires that a wireless workstation can access the APs by showing the correct SSID, so that users in different groups can be allowed to access the APs, and the resource access authority is restricted differently. Therefore, the cloud network management platform 1 includes the service set identification management module 11.
The cloud network management platform is a wireless network cloud management platform expanded on the basis of an AC basic idea, SSID management of the cloud network management platform supports an 802.1x authentication mode and a portal authentication internet access mode, and the two modes support an authentication source based on a third-party data source.
The cloud network management platform is based on a cloud platform server, an operating system is installed on the cloud platform server, the operating system can be a windows operating system, and can also be other operating systems such as Android, iOS, Linux and the like, and the operating system can only support an 802.1x authentication mode and a portal authentication internet access mode.
The service set identification management module is used for managing the employee account, including the internet access authentication of the employee account. The service set identification management module is also used for establishing a root domain in a grading way and according to the leaf nodes under the account number.
The steps of the third-party data source authentication network-accessing management method realized by the cloud network management platform are as follows.
S1) the cloud network management platform carries out hierarchical management on the employee accounts through the service set identification.
I.e., S11) establishes a root domain on the network management platform and configures employee accounts under the root domain. And meanwhile, carrying out hierarchical and hierarchical management on the root domain, if a subordinate account of the root domain exists, establishing leaf nodes under the root domain, and managing the subordinate account through the leaf nodes.
At this time, S12) the root domain is configured with the internet surfing time or traffic of the root domain, and the leaf node is also configured with the internet surfing time or traffic.
S2) allowing the employee account to connect with the service set to identify the local area network for management by the cloud network management platform. In this step, the employee account needs to be determined, and whether the employee account meets the conditions for connecting to the local area network, such as password verification or user IP address confirmation, is not described again. If the identification is unsuccessful, the local area network refuses the access of the employee account, and if the identification is successful, the employee account is accessed to the local area network; or the account number of the employee can be directly accessed to the local area network without setting a password.
S3) when the employee account is connected with the local area network; and the cloud network management platform carries out authentication management on the employee account. In this step, the cloud network management platform performs hierarchical and hierarchical management on the root domain and leaf nodes under the root domain respectively: when the employee account belongs to the root domain account, the employee account can acquire the internet surfing duration or flow allocated under the root domain account; when the employee account belongs to the employee account under the leaf node, the internet surfing duration or the internet surfing flow of the employee account needs to be configured according to a preset protocol. The preset protocol is set by a manager, for example, the leaf node is configured with different internet surfing durations or different internet surfing flows, the employee account number under each leaf node obtains the internet surfing duration or the internet surfing flow of the leaf node to which the employee account number belongs, and the configuration method is set according to the management requirement.
Embodiment 2, as shown in fig. 3 and 4, on the basis of the above embodiments, further perfection is performed on embodiment 1 to meet the requirements of hierarchical and hierarchical management on different employee accounts.
The step S12) is followed by a step S13) that the leaf node comprises a plurality of organization units and configures employee account numbers under the leaf node. The organization unit in the step S13) includes a normal subscriber unit, a stand-alone unit, and a third unit, and the third unit is other than the normal subscriber unit and the stand-alone unit.
And the common user unit is used for managing the employee account under the common user unit and distributing the internet surfing duration or flow of the employee account, and the internet surfing duration or flow of the employee account is obtained from the nearest leaf node.
The independent unit is used for managing the employee accounts and distributing the duration or the flow of the employee accounts under the independent unit, and the duration or the flow of the employee accounts are distributed independently by the cloud network management platform.
And the third unit is used for managing the employee account numbers under the third unit and distributing the duration or the flow of the employee account numbers, and the duration or the flow of the employee account numbers is obtained by the root domain.
S14) configuring the internet surfing time or traffic of each organization unit in the leaf node.
In embodiment 1, it can be seen that different internet access time lengths or different internet access traffic amounts are configured for the root domain and the leaf nodes. When the employee account is connected to the local area network in step S3), the internet surfing time or traffic is obtained as follows.
In step S1), the root domain dc is established as abcd and dc is com. A leaf node under the root domain is established, the leaf node including a plurality of organizational units. The organization units in the step S13) include common user units, independent units and other units. Common subscriber units are, for example, ou, dc, adcd, and dc, com. Other units are cn ═ tom, ou ═ questions, dc ═ abcd, and dc ═ com. Independent units such as uid ═ lucy, ou ═ users, dc ═ abcd, dc ═ com. Thus, the parameters are defined, the employee account also has the preset parameters, the parameters of the employee account are matched in a grading and layering manner, and when the employee account belongs to the root domain, the internet surfing duration or the flow of the employee account is obtained by the root domain; when the employee account belongs to the common user unit, the internet surfing duration or the internet surfing flow of the employee account is obtained from the leaf node according to the recent principle;
when the employee account belongs to the third unit, the internet surfing duration or the internet surfing flow of the employee account is obtained by the root domain; and when the employee account belongs to the independent unit, the internet surfing duration or the flow of the employee account is configured independently.
Therefore, in step S3), the specific steps thereof are as follows.
S31) authenticating the employee account.
S32), when the employee account passes the authentication, the employee account obtains the internet surfing duration or flow; when the employee account cannot pass the authentication, the employee account cannot acquire the internet surfing duration or the internet surfing flow.
And in the step S32), after the employee account passes the authentication, determining whether the employee account belongs to an independent unit, and if so, acquiring the internet surfing duration or traffic according to the account standard of the independent unit by the employee account. And judging whether the employee account belongs to a common user unit, if so, obtaining the internet surfing time or the flow of the employee account from the leaf node according to the latest principle. And judging whether the employee account belongs to other units, if so, obtaining the internet surfing duration or the flow of the employee account by the root domain. And judging that the employee account belongs to the root domain, and if so, configuring the internet surfing time or the flow of the employee account independently.
By the method, the employee accounts of different levels and different types can be managed respectively, and division and permission setting of various employee accounts are facilitated.
Embodiment 3, as shown in fig. 5, on the basis of the above embodiment, further improvement is performed on embodiment 2, so as to meet the requirements of hierarchical and hierarchical management on different employee account numbers, for example, when account numbers are deleted and updated, management and setting of the employee account numbers under the root domain or the employee account numbers under the leaf nodes are performed.
After the root domain, the leaf nodes under the root domain, and the management ways for allocating the employee account numbers are established, if the leaf nodes or the entire root domain account numbers need to be changed, the operation is performed according to the following steps.
S15), deleting the root domain or the leaf node, and deleting the account numbers in all the leaf nodes derived from the root domain or the leaf node when the root domain or the leaf node is deleted.
S16), updating the root domain or the leaf node, and deleting the account numbers in all the leaf nodes derived from the root domain or the leaf node when the root domain or the leaf node is updated.
If the root domain or the leaf node is deleted or updated in step S15) or step S16), the deleted account will obtain a new duration or traffic again according to steps S11) to S14) during re-authentication.
In the above embodiments 1-3, the authentication source managed by the cloud AC management platform configuration Service Set Identifier (SSID) is a third-party data source, and an enterprise or a company can allow an employee to use its account to connect with the SSID and access a page by using the cloud AC management platform, so that the company internet access resource is isolated from the outside, and network security using wireless wifi is ensured.
The user uses the ssid to surf the internet, the management platform needs to manage the user duration or flow, including whether the user duration or flow is used up and needs to be re-authenticated, different user internet duration or flow can be configured for users at different Organization Unit (OU) levels, the same user duration can be configured for users at the same OU level, and the unique user duration or flow can be configured for some users.
And meanwhile, deletion and modification of the duration or the flow of the domain account or the leaf node of the domain account are supported. When the domain account or the leaf node thereof is deleted, the account of the derived time length or the traffic is also deleted synchronously. When the domain account number or the leaf node thereof is updated, the account number of the derived duration or traffic will be updated.
The present invention is not limited to the above preferred embodiments, and any modifications, equivalent substitutions and improvements made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (4)

1. A third-party data source authentication network-accessing management method based on LDAP protocol is applied to a cloud network management platform which is managed based on service set identification and is characterized by comprising the following steps,
s1) the cloud network management platform carries out hierarchical management on employee accounts through service set identification;
s2), allowing the employee account to connect with the local area network of the service set identification management by the cloud network management platform;
s3) when the employee account is connected with the local area network; the cloud network management platform carries out authentication management on the employee account;
the step S1) includes the steps of:
s11), establishing a root domain, and configuring the employee account under the root domain;
s12) configuring the internet surfing time length or the traffic of the root domain;
the step S1) further includes the following steps,
s15) deleting the root domain or leaf node: when the root domain or the leaf node is deleted, the account numbers in all the leaf nodes derived from the root domain or the leaf node are deleted at the same time;
said step S12) further comprises the following steps,
s13), establishing a leaf node under the root domain, wherein the leaf node comprises a plurality of organization units and configures employee account numbers under the leaf node;
s14) configuring the internet surfing time length or the flow of each organization unit in the leaf node;
the organization unit in the step S13) includes:
the ordinary user unit is used for managing the employee account under the ordinary user unit and distributing the internet surfing duration or flow of the employee account, and the internet surfing duration or flow of the employee account is obtained from the nearest leaf node;
the independent unit is used for managing the employee accounts under the independent unit and allocating duration or flow of the employee accounts, and the duration or flow of the employee accounts is allocated by the cloud network management platform independently;
and the third unit is used for managing the employee account numbers in the third unit and distributing the duration or the flow of the employee account numbers, and the duration or the flow of the employee account numbers is obtained by the root domain.
2. The LDAP protocol-based third party data source authentication upload management method according to claim 1, wherein said step S3) comprises the steps of,
s31) authenticating the employee account;
s32), when the employee account passes the authentication, the employee account obtains the internet surfing duration or flow; when the employee account cannot pass the authentication, the employee account cannot acquire the internet surfing duration or the internet surfing flow.
3. The LDAP protocol-based third party data source authentication uploading management method according to claim 2, wherein in step S32), when the employee account authentication passes,
when the employee account belongs to the root domain, the internet surfing duration or the internet surfing flow of the employee account is obtained by the root domain;
when the employee account belongs to the common user unit, the internet surfing duration or the internet surfing flow of the employee account is obtained from leaf nodes according to a recent principle;
when the employee account belongs to the third unit, the internet surfing duration or the internet surfing flow of the employee account is obtained by the root domain;
and when the employee account belongs to the independent unit, the internet surfing duration or the flow of the employee account is configured independently.
4. The LDAP protocol-based third party data source authentication upload management method according to claim 1, wherein said step S1) further comprises the steps of,
s16), updating the root domain or the leaf node, and deleting the account numbers in all the leaf nodes derived from the root domain or the leaf node after the root domain or the leaf node is updated.
CN201611014996.7A 2016-11-18 2016-11-18 Third-party data source authentication network-accessing management method based on LDAP protocol Active CN106656566B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611014996.7A CN106656566B (en) 2016-11-18 2016-11-18 Third-party data source authentication network-accessing management method based on LDAP protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611014996.7A CN106656566B (en) 2016-11-18 2016-11-18 Third-party data source authentication network-accessing management method based on LDAP protocol

Publications (2)

Publication Number Publication Date
CN106656566A CN106656566A (en) 2017-05-10
CN106656566B true CN106656566B (en) 2020-06-05

Family

ID=58808049

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611014996.7A Active CN106656566B (en) 2016-11-18 2016-11-18 Third-party data source authentication network-accessing management method based on LDAP protocol

Country Status (1)

Country Link
CN (1) CN106656566B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810031A (en) * 2018-07-23 2018-11-13 迈普通信技术股份有限公司 WiFi keeping methods, apparatus and system
CN111355607A (en) * 2020-02-17 2020-06-30 苏州亿歌网络科技有限公司 LDAP-based domain management method, system, device, equipment and storage medium
CN112883421A (en) * 2020-09-05 2021-06-01 蔡春梅 Information protection method and information protection system based on cloud computing and block chain service

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933483A (en) * 2005-11-28 2007-03-21 王伟珣 System and method for network accession utilizing single clicking single pointing
CN104134113A (en) * 2013-12-23 2014-11-05 国云科技股份有限公司 Information system and integration method based on cloud computing SaaS service model
CN104615916A (en) * 2014-12-12 2015-05-13 腾讯科技(深圳)有限公司 Account management method and device and account permission control method and device
CN105472613A (en) * 2016-01-15 2016-04-06 上海斐讯数据通信技术有限公司 Authentication request receiving method and system, user end and AP

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933483A (en) * 2005-11-28 2007-03-21 王伟珣 System and method for network accession utilizing single clicking single pointing
CN104134113A (en) * 2013-12-23 2014-11-05 国云科技股份有限公司 Information system and integration method based on cloud computing SaaS service model
CN104615916A (en) * 2014-12-12 2015-05-13 腾讯科技(深圳)有限公司 Account management method and device and account permission control method and device
CN105472613A (en) * 2016-01-15 2016-04-06 上海斐讯数据通信技术有限公司 Authentication request receiving method and system, user end and AP

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于LDAP的校园网统一身份认证系统研究和实践;谢飏;《中国优秀硕士学位论文全文数据库 信息科技辑》;20050315(第1期);全文 *

Also Published As

Publication number Publication date
CN106656566A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
CN106375987B (en) A method and system for selecting network slices
AU2003285885B2 (en) Configuration of enterprise gateways
US7962596B2 (en) Automated provisioning system
CN100502307C (en) A centralized user security management method and device
CN102739455B (en) A kind of method of network equipments configuration and device
US8346940B2 (en) Method and system for provisioning customer premises equipment
CN112566154A (en) Network entity and method for identifier allocation and/or identifier mapping for network services
CN108616613A (en) A kind of decentralization root domain name service method and system based on block chain
CN102017687A (en) Method and device for instantiating management objects of terminal equipment management tree
CN106656566B (en) Third-party data source authentication network-accessing management method based on LDAP protocol
US20070006299A1 (en) System and method of user credential management
US20160345170A1 (en) Wireless network segmentation for internet connected devices using disposable and limited security keys and disposable proxies for management
CN112333711B (en) Wireless network providing method, device and storage medium
CN106506239B (en) Method and system for authentication in organization unit domain
CN106603435B (en) Method and device for allocating port block resources
CN113542033B (en) Many-to-many mapping method and system for alliance chain foundation establishment and management platform
WO2009153402A1 (en) Method, arrangement and computer program for authentication data management
TWI474731B (en) Wimax client and mothed for setting parameters of wimax client
CN106034048B (en) A kind of method and device of information configuration
CN107959674B (en) Gateway equipment, and method and system for controlling access to third-party LDAP server user
CN102299836A (en) Method and device for accessing access equipment
CN101599831B (en) Method and system for managing communication network security
FI113095B (en) Formation of user-specific installation information
CA2511201C (en) System and method of user credential management
US9558195B2 (en) Depopulation of user data from network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201027

Address after: 318015 no.2-3167, zone a, Nonggang City, no.2388, Donghuan Avenue, Hongjia street, Jiaojiang District, Taizhou City, Zhejiang Province

Patentee after: Taizhou Jiji Intellectual Property Operation Co.,Ltd.

Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201218

Address after: 313300 Sunshine Industrial Park, Dipu Town, Anji County, Huzhou City, Zhejiang Province

Patentee after: Zhejiang Anji chair Technology Co.,Ltd.

Address before: 318015 no.2-3167, area a, nonggangcheng, 2388 Donghuan Avenue, Hongjia street, Jiaojiang District, Taizhou City, Zhejiang Province

Patentee before: Taizhou Jiji Intellectual Property Operation Co.,Ltd.

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A third-party data source authentication online management method based on LDAP protocol

Effective date of registration: 20211022

Granted publication date: 20200605

Pledgee: Zhejiang Anji Rural Commercial Bank of the West Branch of Limited by Share Ltd.

Pledgor: Zhejiang Anji chair Technology Co.,Ltd.

Registration number: Y2021330002007

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20221122

Granted publication date: 20200605

Pledgee: Zhejiang Anji Rural Commercial Bank of the West Branch of Limited by Share Ltd.

Pledgor: Zhejiang Anji chair Technology Co.,Ltd.

Registration number: Y2021330002007

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A Network Management Method of Third Party Data Source Authentication Based on LDAP Protocol

Effective date of registration: 20221123

Granted publication date: 20200605

Pledgee: Zhejiang Anji Rural Commercial Bank of the West Branch of Limited by Share Ltd.

Pledgor: Zhejiang Anji chair Technology Co.,Ltd.

Registration number: Y2022330003167

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20231101

Granted publication date: 20200605

Pledgee: Zhejiang Anji Rural Commercial Bank of the West Branch of Limited by Share Ltd.

Pledgor: Zhejiang Anji chair Technology Co.,Ltd.

Registration number: Y2022330003167

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240204

Address after: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee after: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Country or region after: China

Address before: 313300 Sunshine Industrial Park, Dipu Town, Anji County, Huzhou City, Zhejiang Province

Patentee before: Zhejiang Anji chair Technology Co.,Ltd.

Country or region before: China