Method and device for executing access operation

A technology for accessing operations and executing methods, applied in the computer field, and can solve problems such as low security of business systems

Active Publication Date: 2019-10-18
朗新数据科技有限公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method and device for performing access operations, so

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for executing access operation
  • Method and device for executing access operation
  • Method and device for executing access operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0122] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0123] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for executing an access operation. The method comprises the following steps: receiving an access request sent by a target account; judging whether the operation which is recorded by the service system and allows the target identity to be executed comprises a target access operation, wherein the service system records the operation which allows the identity identified by each identity identifier in the plurality of identity identifiers to be executed; and under the condition that it is judged that the operation allowed to be executed by the target identity and recorded by the service system comprises the target access operation, responding to the access request to execute the target access operation on the service system. According to the methodand the device, the technical problem of relatively low security of executing the access operation on the service system is solved.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a method and device for executing an access operation. Background technique [0002] In the current process of using an account to access a business system, only a single authentication mechanism is provided, resulting in low authentication accuracy and security. [0003] For the above problems, no effective solution has been proposed yet. Contents of the invention [0004] Embodiments of the present invention provide a method and device for executing an access operation, so as to at least solve the technical problem of low security in executing an access operation on a business system. [0005] According to an aspect of an embodiment of the present invention, a method for executing an access operation is provided, including: [0006] receiving an access request sent by a target account, wherein the access request is used to request a target access operation on the business s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/10
Inventor 李天白程威
Owner 朗新数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products