A method for system user to delegate others for security assistance

A system user and client technology, applied in the information field, can solve problems such as client business data security impact, multiple application security risks, system user account and privacy leakage, and achieve the effects of avoiding leakage, ensuring security, and ensuring privacy

Inactive Publication Date: 2020-02-11
厦门海晟融创信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] If the system user needs to entrust others to assist in business operations, or requests assistance from others, the system user is required to provide the account number and password to the assistant, which will cause the leakage of the system user's account number and privacy
[0004] With the development of Internet business, users may use multiple application systems, and the password information set is often the same. Therefor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for system user to delegate others for security assistance
  • A method for system user to delegate others for security assistance

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.

[0025] like figure 1 As shown, according to an embodiment of the present invention, a method for a system user to entrust others to perform security assistance, the method includes the following steps:

[0026] Step 1: The client issues an assistance invitation, and the assistance invitation includes the assistance content and the authorization for the client to log in to the target system. The assistance content realizes different assignment of assistance content to different delegates through role-based access control (RBAC), and the assistance content specifically includes assistance topics, available function modules, available operation functions, accessible business documents and usage restrictions, wherein , the assistance subject is a general description of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for a system user to delegate others for security assistance, comprising the following steps: issuing an assistance invitation list by a delegator, the assistance invitation list comprising assistance content and authorization for a victim to log in a target system; sending the authorization to the trustee; and auditing the login of the supported person and the assisted business operation. According to the method, the assistance invitation list is sent to the entrusted person to enter the target system, so that leakage of a user account password is avoided, andthe privacy of the user is guaranteed; through the management of the assistance invitation list, the available IP segment, the maximum use frequency, the expiration time management, the available function module, the operation function and the accessible service data of the assistance invitation list are limited, detailed auditing is carried out on the operation assisted by an entrustee, and thesafety of the service data of the entrustee is guaranteed.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a method for a system user to entrust others to perform security assistance. Background technique [0002] The application system usually has its own server and its own account system, that is, if the user needs to access the application system, he must first log in to the application system through the account number and password, and the system can only be entered after the server authentication is passed. [0003] If the system user needs to entrust others to assist in business operations, or requests assistance from others, the system user is required to provide the account number and password to the assistant, which will cause the system user's account and privacy to be leaked. [0004] With the development of Internet services, users may use multiple application systems, and the password information set is often the same. Therefore, when the account password of an appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/60
CPCG06F21/31G06F21/604G06F2221/2137G06F2221/2141
Inventor 陈雄华陈家铭孙照波康明军田锐锋
Owner 厦门海晟融创信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products