Unified internal control security management method and system, medium and electronic device

A security management and business system technology, applied in unified internal control security management methods, computer-readable storage media and electronic equipment, and system fields, can solve problems such as application restrictions, access process duplication, and huge resource consumption, so as to improve access Efficiency, reduced development time, and simple operation

Active Publication Date: 2019-09-03
杭州恩牛网络技术有限公司
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the above two commonly used methods realize the function of enterprise internal control and security management, the application of method 1 is limited and can only be implemented in a small number of public systems, which is not universal and consumes a lot of resources; method 2 uses Reaching an agreement in each system only introduces a part of the public interface and then requires each system to cooperate with the access, the access process is duplicated, the system development cycle is long, and it is not convenient to audit the behavior of the operator

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified internal control security management method and system, medium and electronic device
  • Unified internal control security management method and system, medium and electronic device
  • Unified internal control security management method and system, medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0045] figure 1 It is a flow chart of the unified internal control safety management method in Embodiment 1 of the present invention. The unified internal control safety management method provided in this embodiment can be executed by a unified internal control safety management system. The system can be implemented as software, or as software and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a unified internal control security management method and system, a medium and an electronic device. The method is realized through an identity recognition and access management platform, and comprises the steps of creating an SDK of the identity recognition and access management platform according to the permission commonality of a service system, and accessing the servicesystem to the identity recognition and access management platform; intercepting the service system access request of the user, carrying out legality verification, and carrying out authority judgmenton the user sending out the legal access request; and monitoring an operation behavior of accessing the business system by the user through the SDK, and generating and storing an audit log of the user. According to the invention, by creating the SDK of the identity recognition and access management platform, a new service can be conveniently accessed to the identity recognition and access management platform, and the SDK of the IAM can intercept the task request of the user in the service system and monitor the operation behavior of the user in real time, so that the unified domain account management, unified login, unified authority management platform, unified authority application and operation audit are realized.

Description

technical field [0001] The present invention relates to the technical field of information security management, specifically, a unified internal control security management method, system, computer-readable storage medium and electronic equipment. Background technique [0002] There are different business departments and their internal support systems within the enterprise. At present, separate authentication and authorization management is usually used for the business support systems of different departments of the enterprise. The systems between the departments are basically independent. Basically, each business department has its own Its own system, and each system is isolated, rarely can achieve unified control of accounts, permissions, audits, etc., which is not conducive to unified management and security monitoring within the enterprise. [0003] The existing methods for internal control and security management of business systems of different departments in the ente...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/31G06F2221/2141
Inventor 黄瀚
Owner 杭州恩牛网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products