Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for system security authentication and automatic authorization based on big data analysis

An automatic authorization and system security technology, applied in the computer field, can solve problems such as low efficiency, long authorization period, and increased costs for registered users

Inactive Publication Date: 2018-12-21
杭州市商务委员会 +1
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such a manual authorization method, first, increases the cost for registered users; second, the authorization cycle is long and inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for system security authentication and automatic authorization based on big data analysis
  • Method and system for system security authentication and automatic authorization based on big data analysis
  • Method and system for system security authentication and automatic authorization based on big data analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The above and other technical features and advantages of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them.

[0030] Such as figure 1 As shown, a system security authentication and automatic authorization method based on big data analysis, including:

[0031] S100: Obtain the identity authentication information filled in by the user to complete the user registration;

[0032] S200: Sampling the corresponding enterprise filing information, employee insurance information of the Social Security Bureau, and communication operator SIM card information according to the identity authentication information, and authenticate the identity through the enterprise filing information, employee insurance information of the Social Security Bureau, and communication operator SIM card information verify the inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system security authentication and automatic authorization method and system based on big data analysis. Sample the corresponding enterprise filing information according to the identity authentication information, the employee enrollment information of the social security bureau and the SIM card information of the communication operator, and verify the identity authentication information through the enterprise filing information, the employee enrollment information of the social security bureau and the SIM card information of the communication operator; Determine the type of enterprise record according to the enterprise record information, and bind the enterprise type and the role of the user in the system. After binding, complete the automatic authorization of thesystem to the registered user. Through the collection of real and latest management data to verify the identity of registered users, to ensure that registered users can only view the data of their own units, to achieve automatic authentication and automatic authorization of the system security, reduce the cost of e-commerce enterprise users to use the platform, while improving work efficiency, improve the quality of the system.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a system security authentication and automatic authorization method and system based on big data analysis. Background technique [0002] In the network application system that has security requirements for the data accessed by users, in order to verify whether the account information registered by the enterprise user is really the user of the enterprise unit filled in during registration, and to ensure the factuality of the association between the registered account and the enterprise filled in during registration, Ensure that the data viewed by the user is the data of their own unit, and ensure that the user cannot view the data of other companies to avoid the leakage of corporate data. Usually, before the registration account permission is opened, the registered user is required to bring the original business license and registered account of the company The original letter o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/31
CPCG06F21/31G06F21/45G06F2221/2117
Inventor 陈卫菁韩伟沈屹峰丁玲玲张兵兵
Owner 杭州市商务委员会