A method for system user to delegate others for security assistance
A system user and client technology, applied in the information field, can solve problems such as client business data security impact, multiple application security risks, system user account and privacy leakage, and achieve the effects of avoiding leakage, ensuring security, and ensuring privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0024] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
[0025] like figure 1 As shown, according to an embodiment of the present invention, a method for a system user to entrust others to perform security assistance, the method includes the following steps:
[0026] Step 1: The client issues an assistance invitation, and the assistance invitation includes the assistance content and the authorization for the client to log in to the target system. The assistance content realizes different assignment of assistance content to different delegates through role-based access control (RBAC), and the assistance content specifically includes assistance topics, available function modules, available operation functions, accessible business documents and usage restrictions, wherein , the assistance subject is a general description of t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap