A user information access control method based on rbac access control model
A technology for user information and access control, applied in the field of e-commerce information security, can solve problems such as hiding and inability to minimize information, and achieve the effect of improving confidentiality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0013] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with exemplary embodiments. It should be understood that the exemplary embodiments described here are only used to explain the present invention, and are not intended to limit the applicable scope of the present invention.
[0014] First, introduce a third-party security server certified by a public trust agency. The server saves the personal information of all registered users, including but not limited to name, phone number, detailed address and other personal information. At the same time, the server saves the basic information of the logistics sender, including but not limited to the name of the logistics sender and the distribution information of the logistics sender. . In the process of e-commerce transactions, both parties, as registered users, conduct transactions through their registered...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More