End-to-end verification method and system for telecommunication service unauthorized access prevention

A telecommunications service and unauthorized access technology, applied in digital data authentication, data processing applications, electronic digital data processing, etc., can solve the problems of complex interaction process, user information leakage, etc., to improve access efficiency, increase authentication capabilities, Improve the effect of security authentication access capability

Active Publication Date: 2020-09-04
北京思特奇信息技术股份有限公司
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the main mode of the business support system of telecom operators is to handle business through business personnel logging into the system, and user self-service mode to handle business, especially through WEB-level pages for user information query, data selection and entry, page cascading, business processing, The interaction process such as data landing is becoming more and more complicated. At the same time, along with the core system's capability opening through the PAAS layer, the decoupling of central service capabilities, data decoupling to business personnel, and user self-service end-to-end authorization access, new security challenges are presented, especially in Security issues such as unauthorized access to user information, unauthorized ordering, and information leakage by users in the telecommunications industry frequently occur
[0003] However, traditional methods such as WEB interceptors, session authority authentication, and capability layer verification only solve point-to-point security control issues at a certain level, and cannot solve the problem of unauthorized access from the end-to-end perspective of the entire business process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end verification method and system for telecommunication service unauthorized access prevention
  • End-to-end verification method and system for telecommunication service unauthorized access prevention
  • End-to-end verification method and system for telecommunication service unauthorized access prevention

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The principles and features of the present invention will be described below with reference to the accompanying drawings. The examples cited are only used to explain the present invention and are not used to limit the scope of the present invention.

[0023] Such as figure 1 Shown is a schematic flow diagram provided by an embodiment of the end-to-end verification method of the present invention. The end-to-end verification method is used to prevent unauthorized access to telecommunication services, and includes:

[0024] S1: Detect the operation of the salesperson when the salesperson handles telecommunications services for the user, and trigger the public authentication verification interface when the salesperson opens the preset module;

[0025] For example, the public authentication verification interface can be triggered when a salesperson logs on to the OP homepage of the operator and opens the secondary module for the user to handle business.

[0026] It should be underst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an end-to-end verification method and system for telecommunication service unauthorized access prevention, and relates to the field of telecommunication services. The method comprises the steps: when a salesman opens a preset module, triggering a public authentication verification interface; calling a corresponding verification service from multiple types of verification services contained in the public authentication verification interface for verification; generating a token of the user through the unified authentication service according to a preset authentication rule; and verifying the validity of the token of the user after submitting a telecommunication service handling order. According to the invention, the end-to-end security of sensitive information access, sensitive service scenes and complex service handling of users in the telecommunication industry can be improved, and user information acquisition and illegal service handling caused by unauthorizedaccess of the users are avoided; through an end-to-end token authentication mechanism, the problem of business personnel and user-level authentication capability is solved, and the user experience, security control and operation analysis control level are improved on the premise of not sacrificing the basic business capability.

Description

Technical field [0001] The invention relates to the field of telecommunication services, and in particular to an end-to-end verification method and system for preventing unauthorized access to telecommunication services. Background technique [0002] At present, the main mode of the business support system of telecom operators is to log in to the system through business personnel to handle business, and the user self-service mode to handle business, especially through WEB-level pages for user information query, data selection and entry, page cascade, business processing, Data landing and other interactive processes are becoming more and more complex. At the same time, new security challenges are presented by the core system through the PAAS layer capability opening, the decoupling of central service capabilities, the decoupling of data to business personnel, and the end-to-end authorization authentication of users from the service, especially in Security issues such as unknowingl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06F21/60G06F21/62G06Q50/32
CPCG06F21/33G06F21/604G06F21/6245G06Q50/32G06F2221/2137G06F2221/2141
Inventor 陈大海
Owner 北京思特奇信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products