Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Business information system access authority control method and system thereof

A technology for business information and access rights, applied in the field of computer communication, can solve the problems of inefficiency, confusing access rights management, reducing user experience and work efficiency, etc., to avoid management confusion, improve management efficiency, and improve account usage experience.

Inactive Publication Date: 2012-05-02
NO 15 INST OF CHINA ELECTRONICS TECH GRP
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then it is necessary to create an account for this user in the business information system C and assign corresponding permissions, which will increase the cumbersome and confusing account management of the unit system
[0005] To sum up, the access authority control method of the business information system in the prior art needs to assign an account number and authority to each user for different business information systems, which is likely to cause confusion and inefficiency in the management of access authority, and also lead to Inconvenience for users
Users have to remember the account numbers and passwords of the various business information systems they use, and frequently input account numbers, passwords and other information when switching between business information systems, which also greatly reduces user experience and work efficiency, and even system stability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business information system access authority control method and system thereof
  • Business information system access authority control method and system thereof
  • Business information system access authority control method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The embodiment of the present invention provides a centralized business information system access authority control system, such as figure 1 As shown, it includes: an authorization system 101 , an authentication gateway 102 , and a business information system 103 . The authorization system 101 completes the allocation of corresponding accounts to the personnel using the business information system, and grants which business information systems the account can access; the authentication gateway 102 is responsible for completing the verification of the account number, password, and whether the account has access to the current business information system. authenticating. When a user logs in to the business information system 103, the business information system 103 invokes the authentication service of the authentication gateway 102 to complete verification of the account number and authority.

[0034] In the technical solution of the embodiment of the present invention,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a business information system access authority control system and a method thereof. The method comprises the following steps: a business information system obtains login information inputted by a user and sends the information to an authentication gateway; according to an account number in the received login information, the authentication gateway searches account number information of the account number in an account number information table, compares the received information with the searched information, obtains a verification result and returns the information to the business information system, and determines whether the user has access authority of the business information system, wherein, account number information of each account number recorded in the account number information table comprises a code of the account number and authority of the account number to access each business information system. Since the authentication gateway realizes unified centralize verification of authority, a problem that the user needs to use different account numbers and codes to carry out disperse management of verification on each business information system is avoided. Under the condition a plurality of information systems are used simultaneously, management efficiency of verifying account number authority is substantially raised.

Description

technical field [0001] The invention relates to computer communication technology, in particular to a method and system for controlling the access authority of a centralized business information system. Background technique [0002] With the continuous deepening of informatization in government, government agencies, enterprises, universities and other units, the integration of business information systems has gradually become a key point. Assume, in the unit's system, there are: financial business information system, audit business information system, and employee information business information system. Then, for different business information systems in the unit system, it is necessary to establish different accounts for different users and assign different permissions. For example, if a user has access rights to two business information systems A and B at the same time, it is necessary to create an account and assign permissions for this person in the two business inform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 金辉李淑惠傅永财郑扬飞朱春玲张勇贾晓霞郭红钰何岩王非
Owner NO 15 INST OF CHINA ELECTRONICS TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products