Service process security verification method and system
A security verification and business process technology, applied in the field of business process security verification methods and systems, can solve problems such as arbitrage benefits and improper handling procedures, and achieve the effects of improving security and reducing service response time.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] The principles and features of the present invention will be described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.
[0021] Such as figure 1 As shown, it is a schematic flow diagram provided for an embodiment of the business process security verification method of the present invention. The business process security verification method includes:
[0022] S1. Establish a business rule verification record table, a rule service record configuration table, and a submission service and verification link configuration table.
[0023] Among them, the business rule verification record table is used to record the verification results of the preset core links before the final submission of each business, and the rule service record configuration table is used to indicate the items that need to be recorded in the business rule verificati...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com