Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

CRM system anti-unauthorized implementation method and device and storage medium

A CRM system and implementation method technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problem of no service execution authority for job numbers, and achieve the purpose of avoiding illegal business transactions, preventing unauthorized access, and improving security. Effect

Active Publication Date: 2020-08-11
北京思特奇信息技术股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a CRM system anti-override implementation method and its device and storage medium in view of the above-mentioned deficiencies in the prior art, which solves the problem that the employee number has no service execution authority and the service call fails in the prior art. The problem of unauthorized access to user identity authentication ensures the security of CRM system data and prevents unauthorized access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CRM system anti-unauthorized implementation method and device and storage medium
  • CRM system anti-unauthorized implementation method and device and storage medium
  • CRM system anti-unauthorized implementation method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] Embodiment one, as figure 1 As shown, a method for realizing the anti-overreach of a CRM system includes the following steps:

[0076] S1: Obtain the service name of the service to be called in the CRM system, and obtain the service configuration table corresponding to the service to be called according to the service name;

[0077] S2: Obtain the authorization module code set corresponding to the service to be called according to the service configuration table, and judge whether the operator number calling the service to be called has module authority according to the authorization module code set, and if so, execute S3, If not, then end the authorization verification and do not allow calling the service to be called;

[0078] S3: According to the service configuration table, it is judged whether the service to be called has an identity authentication and anti-circumvention flag, if yes, execute S4, if not, end the verification of preventing unauthorized access and n...

Embodiment 2

[0112] Embodiment two, such as Figure 6 As shown, a CRM system anti-overreach implementation device includes a data acquisition module, a first judgment module, a second judgment module, a third judgment module and a service call module;

[0113] The data obtaining module is used to obtain the service name of the service to be called in the CRM system, obtain the service configuration table corresponding to the service to be called according to the service name; and is also used to obtain the service configuration table to be called according to the service configuration table Authorization module code set corresponding to the service;

[0114] The first judging module is used to judge whether the operator number calling the service to be called has module authority according to the authorization module code set;

[0115] The second judging module is used to judge whether the service to be called has an identity authentication anti-bypass identification according to the serv...

Embodiment 3

[0142] Embodiment 3. Based on Embodiment 1 and Embodiment 2, this embodiment also discloses a CRM system anti-overreach implementation device, including a processor, a memory, and a device stored in the memory and capable of running on the processor. A computer program that, when run, implements the figure 1 The specific steps from S1 to S4 are shown.

[0143] Through the computer program stored in the memory and run on the processor, the anti-overreach of the CRM system of the present invention is realized, and the problem of over-authorization in the prior art that the employee number has no service execution authority and the service call fails to pass the user identity authentication is solved. The double security reinforcement of the CRM system prevents services without functional module authority from being illegally invoked, avoids bypassing customer identity authentication for illegal business transactions, prevents unauthorized access, and greatly improves the securit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a CRM system anti-unauthorized implementation method and device and a storage medium, and the method comprises the steps: obtaining a service name of a to-be-called service ina CRM system, and obtaining a service configuration table corresponding to the to-be-called service according to the service name; obtaining an authorization module code set corresponding to the to-be-called service according to the service configuration table, and judging whether the operation job number has the module permission or not according to the authorization module code set; if so, judging whether the to-be-called service has an identity authentication anti-detour identifier or not according to the service configuration table: if so, obtaining a user number corresponding to the to-be-called service, and judging whether the user number passes the identity authentication or not: if so, calling the to-be-called service, and if not, not allowing to call the to-be-called service. According to the invention, double security reinforcement is carried out on the CRM system, services without functional module permission are prevented from being illegally called, illegal business handling by bypassing customer identity authentication is avoided, unauthorized and illegal access is prevented, and the security of the CRM system is greatly improved.

Description

technical field [0001] The invention relates to the technical field of CRM business handling, and in particular to a method for realizing the anti-overreach of a CRM system, a device and a storage medium thereof. Background technique [0002] In the telecom / mobile / Unicom industry, the CRM system (customer relationship management system) is a relatively complex IT support system in China, so the CRM system has high requirements for authority management. Among them, the more common ones that bypass authority management functions are : Override of module authority and user identity authentication. [0003] Module authority overreach means that each account number of the CRM system has a corresponding module function set, and the account number can only access the function modules in its own authority set, and the account number with low authority cannot access the modules of the account number with high authority. This problem has been well solved in the conventional system, b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/08H04L41/18H04L41/5064
Inventor 陈大民
Owner 北京思特奇信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products