Unlock instant, AI-driven research and patent intelligence for your innovation.

ELECTRONIC DEVICE, ustomer information security management method, AND STORAGE MEDIUM

An electronic device and security management technology, which is applied in the field of securities information security, can solve problems such as customer troubles and affect customer trust experience effects, and achieve the effects of reducing troubles, preventing customer information leakage, and improving information security

Active Publication Date: 2019-03-01
PING AN TECH (SHENZHEN) CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Each of the above-mentioned systems requires a large number of operators to carry out relevant operations. Usually, sensitive information of customers will be involved in the process of business processing, such as telephone numbers, ID numbers, customer numbers and other information that can identify users. Sensitive information is circulated in clear text in various business systems. Once the information is leaked, it will bring unnecessary trouble to customers and seriously affect the trust and experience of customers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ELECTRONIC DEVICE, ustomer information security management method, AND STORAGE MEDIUM
  • ELECTRONIC DEVICE, ustomer information security management method, AND STORAGE MEDIUM
  • ELECTRONIC DEVICE, ustomer information security management method, AND STORAGE MEDIUM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] It should be noted that the descriptions involving "first", "second", etc. in the present invention are only for descriptive purposes, and should not be understood as indicating or implying their relative importance or implicitly indicating the number of indicated technical features . Thus, the features defined as "first" and "second" may explicitly or implicitly include at least one...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network security, in particular to the security of sensitive information. The invention discloses an electronic device, a customer information security management method anda storage medium. The method comprises the following steps: obtaining the first identification information of a customer after monitoring the purchase of a securities product by the customer; and encrypting the obtained identity identification information according to a predetermined encryption rule to obtain the encrypted second identification information; determining whether information matching the system identification information of the service system is stored in an authorization list stored in advance after receiving a request sent by the service system for obtaining the first identification information of the customer based on the second identification information; if the system identification information of the service system is stored in the pre-stored authorization list, the first identification information corresponding to the second identification information is sent to the service system. It can improve the information security of securities customers, prevent customer information disclosure, and reduce unnecessary troubles for customers.

Description

technical field [0001] The invention relates to the security field of securities information, in particular to an electronic device, a client information security management method and a storage medium. Background technique [0002] With the development of computer technology, enterprises usually conduct business management or process operations through some management systems. At present, securities companies also rely on different computer systems to quickly and efficiently provide necessary services to customers, such as managing customer information with the help of account management systems, providing customer information, transaction data inquiries, and customer problem records with the help of securities customer service seat support systems With the help of the centralized trading system, it provides services such as customer transactions, clearing, transfers, statement inquiries, and customer information inquiries. Each of the above-mentioned systems requires a la...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q40/04G06F21/62
CPCG06F21/6263G06Q40/04
Inventor 陈翔
Owner PING AN TECH (SHENZHEN) CO LTD