Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A secure access method and device for a service product

A secure access and business technology, applied in the Internet field, can solve the problems of low access security service efficiency, large number of personnel, fragmented risk assessment process, etc., and achieve the effect of solving joint debugging difficulties, accelerating docking, and improving assessment efficiency

Active Publication Date: 2022-02-01
ADVANCED NEW TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional way, the access process of business products is promoted by business personnel. Due to the relatively long process link of security protection service docking, more personnel are involved, and the security internal operation is a black box for the business side, which leads to the fragmentation of the risk assessment process. , Difficulty in docking security products, low efficiency in accessing security services, etc.
At present, there is a lack of standardized security access management methods and systems. On the basis of ensuring comprehensive and effective analysis of business risks from the process, the docking of business products and security protection services is accelerated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure access method and device for a service product
  • A secure access method and device for a service product
  • A secure access method and device for a service product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.

[0031] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application provides a method and device for secure access to business products, which first receive the security access requirements of business products submitted by the business party; generate evaluation requests in different directions according to the security access requirements, and determine the corresponding The evaluator who evaluates the request in different directions sends the evaluation request in different directions to the corresponding evaluator respectively; then receives the evaluation result fed back by the evaluator according to the evaluation request, and determines the security optimization requirements of the business product itself through the evaluation result, The security product that needs to be connected with the business product; finally, according to the security access requirements of the business product, determine the joint use case configuration of the security product that the business product needs to be connected with, and generate according to the joint use case configuration and its own pre-stored different code segments The final code, so that the business side can complete the development joint debugging according to the final code. This application solves the problem of fragmentation in the evaluation process and improves the evaluation efficiency.

Description

technical field [0001] This specification relates to the field of the Internet, and in particular to a method and device for securely accessing service products. Background technique [0002] When a certain business product needs to be connected to an open platform such as Alipay, there are many payment risks involved, including account theft, cheating risks, cash-out risks, money laundering risks, data leakage risks, system vulnerability risks, and network attack risks, etc. [0003] In order to deal with these risks, the platform security technology department not only provides various security protection products, including data risk control products, content security products, human-machine identification products, etc., but also gives suggestions on business product optimization from a security perspective. In the traditional way, the access process of business products is promoted by business personnel. Due to the relatively long process link of security protection ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/06G06Q10/04
CPCG06Q10/04G06Q10/0637
Inventor 周红伟
Owner ADVANCED NEW TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More