Service process security verification method and system

A security verification and business process technology, applied in the field of business process security verification methods and systems, can solve problems such as arbitrage benefits and improper handling procedures, and achieve the effects of improving security and reducing service response time.

Active Publication Date: 2020-09-25
北京思特奇信息技术股份有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there are many kinds of plug-in tools now, and many lawbreakers use plug-in tools to reduce some verification links, directly submit the final processing for users, and use improper processing procedures to accept various business for unacceptable users, illegally arbitrating profits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service process security verification method and system
  • Service process security verification method and system
  • Service process security verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The principles and features of the present invention will be described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0021] Such as figure 1 As shown, it is a schematic flow diagram provided for an embodiment of the business process security verification method of the present invention. The business process security verification method includes:

[0022] S1. Establish a business rule verification record table, a rule service record configuration table, and a submission service and verification link configuration table.

[0023] Among them, the business rule verification record table is used to record the verification results of the preset core links before the final submission of each business, and the rule service record configuration table is used to indicate the items that need to be recorded in the business rule verificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a service process security verification method and system, and relates to the field of telecommunication service support. The method comprises the following steps: establishinga business rule verification record table, a rule service record configuration table and a submission service and verification link configuration table; after the business process is started, markinga preset core link to generate a unique marking identifier, and recording a business verification operation result of the preset information of the current operation in the preset core link; and after the business process is finished, judging whether the service recorded in the rule service record configuration table is executed or not, if so, reading a link needing to be verified in the submitted service and verification link configuration table, and judging whether the security verification is passed or not through the unique marking identifier in the business rule verification record table. According to the invention, foreground handling and plug-in handling are identified through the unique marking identifier, illegal plug-in handling business can be intercepted, the system security is improved, and the service response duration is reduced.

Description

technical field [0001] The invention relates to the field of telecommunication service support, in particular to a method and system for verifying the security of a service process. Background technique [0002] At present, with the development of telecommunication services, the rules of the CRM business system in the entire telecommunication industry are complicated, and various services are interdependent and restricted. Many rules of the system are verified step by step. [0003] However, there are many kinds of plug-in tools now, and many lawbreakers use plug-in tools to reduce some verification links, directly submit the final processing for users, and use improper processing procedures to accept various business for unacceptable users, illegally arbitrating profits . Contents of the invention [0004] The technical problem to be solved by the present invention is to provide a business process security verification method and system for the deficiencies of the prior ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 徐茜
Owner 北京思特奇信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products