Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Permission auditing method and device

A technology for accessing users with authority and unauthorized access, applied in the field of communication, can solve problems such as the inability to implement business authority audits, and achieve the effect of satisfying security management and avoiding security risks

Active Publication Date: 2016-07-27
CHINA MOBILE GROUP JILIN BRANCH
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a permission audit method and device to solve the technical problem in the prior art that relying on manual analysis and the system's own permission control cannot meet the requirements of business permission audit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission auditing method and device
  • Permission auditing method and device
  • Permission auditing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some of the embodiments of the present invention, rather than all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0047] figure 1 It is a schematic flow chart corresponding to an authority audit method provided by the embodiment of the present invention, the method includes steps 101 to 103:

[0048] Step 101, obtaining the current usage authority category of the system to be audited;

[0049] Step 102: Comparing the current use authority category with the authority category set by the system to be audited to obtain the newly added authority in vi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a permission auditing method and device. The method of the embodiment of the invention comprises the following steps: obtaining the current use permission category of a system to be audited; comparing the current use permission category with a permission category set by the system to be audited to obtain a new permission of violation and an unused permission; according to the application flow log of the system to be audited, obtaining a user and use permission relationship so as to obtain a high-frequency access user; and comparing the user and use permission relationship with a user and set permission relationship set by the system to be audited to obtain a exceeding authority access user. The embodiment of the invention realizes a purpose that the new permission of the violation and the unused permission in the system to be audited are obtained and the high-frequency access user and the exceeding authority access user are obtained, so that safety risks in the system to be audited can be effectively avoided, and the requirement of the safety management of the system to be audited is met.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for checking authority. Background technique [0002] At present, all kinds of application systems in the business support system use the system's own authority management module to identify and control the access authority of the application system. Its main business model includes the following steps: Step 1, during the development and launch process of the application system, register and release management of system permissions, and all system permissions are managed by the system's own permission management module; Step 2, the administrator According to the business access needs of the application system, the user's access authority is defined, and the identification information of the operation access authority is set; Step 3, the user logs in to the application system using the assigned operation authority identification information; the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31H04W24/00
Inventor 徐党生于雷杨宇刘赫
Owner CHINA MOBILE GROUP JILIN BRANCH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products