Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for system user to delegate others for security assistance

A system user and client technology, applied in the information field, can solve problems such as client business data security impact, multiple application security risks, system user account and privacy leakage, and achieve the effects of avoiding leakage, ensuring security, and ensuring privacy

Inactive Publication Date: 2020-02-11
厦门海晟融创信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] If the system user needs to entrust others to assist in business operations, or requests assistance from others, the system user is required to provide the account number and password to the assistant, which will cause the leakage of the system user's account number and privacy
[0004] With the development of Internet business, users may use multiple application systems, and the password information set is often the same. Therefore, when the account password of an application is leaked, it may cause security risks for multiple applications.
[0005] In addition, the trustee uses the account number and password of the trustee to enter the target system, and the trustee can operate all functional modules and operating functions owned by the trustee, and access all business documents of the trustee, so the security of the trustee's business data will also be affected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for system user to delegate others for security assistance
  • A method for system user to delegate others for security assistance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.

[0025] Such as figure 1 As shown, a method for a system user to entrust others to perform security assistance according to an embodiment of the present invention, the method includes the following steps:

[0026] Step 1: The principal issues an assistance invitation, which includes assistance content and authorization for the trustee to log in to the target system. The assistance content uses role-based access control (RBAC) to implement different assignments of assistance content to different delegates. The assistance content specifically includes assistance topics, available functional modules, available operating functions, accessible business documents, and usage restrictions. , the subject of assistance is a general description of this assistance, and the restrictions include ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for a system user to delegate others for security assistance, comprising the following steps: issuing an assistance invitation list by a delegator, the assistance invitation list comprising assistance content and authorization for a victim to log in a target system; sending the authorization to the trustee; and auditing the login of the supported person and the assisted business operation. According to the method, the assistance invitation list is sent to the entrusted person to enter the target system, so that leakage of a user account password is avoided, andthe privacy of the user is guaranteed; through the management of the assistance invitation list, the available IP segment, the maximum use frequency, the expiration time management, the available function module, the operation function and the accessible service data of the assistance invitation list are limited, detailed auditing is carried out on the operation assisted by an entrustee, and thesafety of the service data of the entrustee is guaranteed.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a method for a system user to entrust others to perform security assistance. Background technique [0002] The application system usually has its own server and its own account system, that is, if the user needs to access the application system, he must first log in to the application system through the account number and password, and the system can only be entered after the server authentication is passed. [0003] If the system user needs to entrust others to assist in business operations, or requests assistance from others, the system user is required to provide the account number and password to the assistant, which will cause the system user's account and privacy to be leaked. [0004] With the development of Internet services, users may use multiple application systems, and the password information set is often the same. Therefore, when the account password of an appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/60
CPCG06F21/31G06F21/604G06F2221/2137G06F2221/2141
Inventor 陈雄华陈家铭孙照波康明军田锐锋
Owner 厦门海晟融创信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products