A remote office business authorization method, terminal and system

An authorized terminal, remote office technology, applied in transmission systems, office automation, digital transmission systems, etc., can solve the problems of multiple security risks, inconvenience of traceability, inflexibility, etc., to avoid security limitations, improve flexibility and security. Effect

Active Publication Date: 2022-02-08
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing remote office-based authorization mechanism is inflexible, and it is easy to be fraudulently used or colluded to commit crimes. It is inconvenient to trace back, and the integration degree is low, the real-time performance is poor, and there are many security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A remote office business authorization method, terminal and system
  • A remote office business authorization method, terminal and system
  • A remote office business authorization method, terminal and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Such as figure 1 As shown, a remote office business authorization method includes the following steps:

[0042] S0, determine the authorized terminal, determine the authorized terminal, determine the service server;

[0043]It can be understood that the authorized terminal or the authorized terminal is not unique, the authorized terminal may be other authorized terminals as authorized terminal devices, and the authorized terminal may be other authorized terminals as authorized terminal devices Terminal; the authorized terminal and the authorized terminal may be a smart phone, a desktop computer, a portable notebook computer, a tablet device, a digital broadcast terminal, an intelligent control device or an intelligent wearable device, etc.

[0044] S1, when the authorized terminal needs to process business, the authorized terminal will send a privilege escalation request to the authorized terminal;

[0045] S2, the authorized terminal takes over and activates the imag...

Embodiment 2

[0063] attached Figure 4 An authorization terminal is shown, and the authorization terminal includes a first user audit module, a second user audit module, a third user audit module, a business audit module, a business processing module, and a signature processing module; wherein,

[0064] The first user verification module is configured to receive a request for escalation of rights sent by an authorized terminal, take over and enable the image acquisition device of the authorized terminal according to the request for escalation of rights, collect images of users corresponding to the authorized terminal, and confirm that the The user identity of the authorized terminal;

[0065] The second user review module is used to enable the image collection device of the authorized terminal, collect the user image corresponding to the authorized terminal, generate the fusion interface of the authorized terminal business and the authorized terminal user image, and send it to the authoriz...

Embodiment 3

[0072] attached Figure 4 It also shows an authorized terminal, which includes a first user audit module, a second user audit module, a business processing module, a business audit module, and a signature processing module; wherein,

[0073] The first user verification module is used to receive the authorized terminal service and the image fusion interface of the authorized terminal user sent by the authorized terminal, and confirm the user identity of the authorized terminal;

[0074] The second user verification module is used to authenticate the identity of the authorized terminal user before signing the second business processing monitoring record; specifically, the method adopted for the identity authentication of the authorized end user can be a biometric identification algorithm, UKey identification algorithm or PIN code verification algorithm, or a combination of at least two of the above authentication methods;

[0075] The business processing module is used to send ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a remote office service authorization method, terminal and system. The method includes: an authorized terminal sends a rights escalation request to the authorized terminal; and the authorized terminal takes over and enables image capture of the authorized terminal according to the received rights escalation request. equipment, collect the user image corresponding to the authorized terminal to confirm the user identity of the authorized terminal; after the user identity of the authorized terminal is confirmed, the authorized terminal and the authorized terminal respectively enable the remote desktop protocol, and log in to the remote desktop server, etc. In the present invention, an authorized terminal initiates a service application and entrusts the service to the authorized terminal for processing, the authorized terminal conducts business and user review and authorization of service processing, and the authorized terminal and the authorized terminal respectively generate service processing monitoring based on a fusion interface. The records are verified by the business server and the business is executed, so as to ensure that the remote office business is safe, traceable and close to the security of offline office.

Description

technical field [0001] The invention relates to the technical field of remote office, in particular to a remote office business authorization method, terminal and system. Background technique [0002] With the development of the times and the occurrence of special events such as sudden public epidemics, large-scale telecommuting in the digital age has become a trend. Telecommuting of all employees means that a large number of internal personnel of enterprises and institutions need to access any accounts, documents or data that can maintain normal work from outside the security boundary of enterprises and institutions (including home or unsafe WiFi hotspots), as well as for business needs. If some important and sensitive data is modified, if there is no authorization for data access or modification, there will be a huge security risk, resulting in the leakage of business secrets, equipment damage, data loss, and even system paralysis and damage to economic interests. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04N5/265G06Q10/10
CPCH04L63/101H04L63/08H04L63/18H04N5/265G06Q10/10
Inventor 刘熙胖梁松涛刘长河廖正赟李鑫孙晓鹏
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products