Unlock instant, AI-driven research and patent intelligence for your innovation.

Service processing method, device and system

A business processing and business request technology, applied in the communication field, can solve problems such as security risks, user password leakage, difficulties, etc., and achieve the effect of avoiding security risks, simple maintenance management process, and certification-free maintenance management

Active Publication Date: 2021-09-28
NEW H3C TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the above method, the user needs to provide account information (such as user name and password) to the service provider or agent, which has certain security risks, especially providing the password to the service provider or agent will cause the user password to be compromised. leakage
On the other hand, when service providers or agents perform maintenance management for a large number of users, they need to know the account information (such as user names and passwords, etc.) of a large number of users. It is difficult to remember these account information. Unable to perform maintenance management for users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service processing method, device and system
  • Service processing method, device and system
  • Service processing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The terms used in the embodiments of the present application are only for the purpose of describing specific embodiments, rather than limiting the present application. As used in this application and the claims, the singular forms "a", "the" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

[0044] It should be understood that although the embodiments of the present application may use terms such as first, second, and third to describe various information, such information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present application, first information may also be called second information, and similarly, second ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a service processing method, device and system. The method comprises the steps of obtaining a user name of a first subordinate user needing to be subjected to commission maintenance management by a commission maintenance account; sending a commissioning maintenance request of the first subordinate user to the authentication device, wherein the commissioning maintenance request comprises a superior temporary token of the commissioning maintenance account and a user name of the first subordinate user; receiving a subordinate temporary token sent by the authentication device, the subordinate temporary token being generated for the first subordinate user when the authentication device determines that the first subordinate user passes the authentication based on the superior temporary token; sending a service request of the first subordinate user to the authentication device, the service request comprising service data and a subordinate temporary token, so that the authentication device determines that the first subordinate user passes authentication based on the subordinate temporary token, determines a user name of the first subordinate user corresponding to the subordinate temporary token, and carries out commissioning maintenance management on the first subordinate user based on the service data. Through the technical scheme of the application, the leakage of the user password is avoided, and the potential safety hazard is avoided.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a service processing method, device and system. Background technique [0002] Multi-tenancy, also known as multi-tenancy, is a new software architecture technology under the cloud computing infrastructure management model and one of the key technologies of cloud computing. Multi-tenancy technology can make full use of the economic scale effect and provide Multiple tenants provide shared system, program components, memory, and background processes. [0003] In multi-tenant technology, it is necessary to provide the same service and customized service for multiple tenants, ensure data isolation between tenants, realize multiple tenants sharing system instances, and realize personalized customization of tenants' system instances to ensure system commonality The individual parts are shared, and the individual parts are isolated separately. Through resource reus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L29/06H04L9/32
CPCH04L41/28H04L41/046H04L41/0246H04L63/0807H04L9/3228
Inventor 池金燕施亚晖王一凡
Owner NEW H3C TECH CO LTD