Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and a device for secure access to a service product

A secure access and business technology, applied in the Internet field, can solve problems such as low access security service efficiency, large number of personnel, and fragmented risk assessment process, and achieve the effects of solving joint debugging difficulties, accelerating docking, and improving assessment efficiency

Active Publication Date: 2019-01-11
ADVANCED NEW TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional way, the access process of business products is promoted by business personnel. Due to the relatively long process link of security protection service docking, more personnel are involved, and the security internal operation is a black box for the business side, which leads to the fragmentation of the risk assessment process. , Difficulty in docking security products, low efficiency in accessing security services, etc.
At present, there is a lack of standardized security access management methods and systems. On the basis of ensuring comprehensive and effective analysis of business risks from the process, the docking of business products and security protection services is accelerated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and a device for secure access to a service product
  • A method and a device for secure access to a service product
  • A method and a device for secure access to a service product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.

[0031] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for secure access to a service product. The method includes the following steps: firstly receiving a service product securing access requirement submittedby a service party; generating an evaluation request of different directions according to the security access demand, determining an evaluator corresponding to the evaluation request of the differentdirections according to preset information, and sending the evaluation request of the different directions to the corresponding evaluator respectively; receiving the evaluation result fed back by theevaluation request by the evaluation party, and determining the security optimization requirements of the business product itself through the evaluation result and the security product to be docked with the business product; finally, according to the security access requirement of the service product, determining the joint calling example configuration of the security product that the service product needs to interface, and generating the final code according to the joint calling example configuration and different code segments stored in the joint calling example configuration, so that the service party can complete the development joint debugging according to the final code. The present application solves the problem of fragmentation of the evaluation process and improves the evaluationefficiency.

Description

technical field [0001] This specification relates to the field of the Internet, and in particular to a method and device for securely accessing service products. Background technique [0002] When a certain business product needs to be connected to an open platform such as Alipay, there are many payment risks involved, including account theft, cheating risks, cash-out risks, money laundering risks, data leakage risks, system vulnerability risks, and network attack risks, etc. [0003] In order to deal with these risks, the platform security technology department not only provides various security protection products, including data risk control products, content security products, human-machine identification products, etc., but also gives suggestions on business product optimization from a security perspective. In the traditional way, the access process of business products is promoted by business personnel. Due to the relatively long process link of security protection ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q10/04
CPCG06Q10/04G06Q10/0637
Inventor 周红伟
Owner ADVANCED NEW TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More