Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure access method and device for service product

A secure access and business technology, applied in the Internet field, can solve the problems of low access security service efficiency, large number of personnel, fragmented risk assessment process, etc., and achieve the effects of improving assessment efficiency, solving joint debugging difficulties, and accelerating docking

Pending Publication Date: 2022-05-13
ADVANCED NEW TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional way, the access process of business products is promoted by business personnel. Due to the relatively long process link of security protection service docking, more personnel are involved, and the security internal operation is a black box for the business side, which leads to the fragmentation of the risk assessment process. , Difficulty in docking security products, low efficiency in accessing security services, etc.
At present, there is a lack of standardized security access management methods and systems. On the basis of ensuring comprehensive and effective analysis of business risks from the process, the docking of business products and security protection services is accelerated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access method and device for service product
  • Secure access method and device for service product
  • Secure access method and device for service product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.

[0031] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a service product security access method and device. The method comprises the following steps: firstly, receiving a service product security access demand submitted by a service party; generating evaluation requests in different directions according to the security access demand, determining evaluation parties corresponding to the evaluation requests in different directions according to preset information, and respectively sending the evaluation requests in different directions to the corresponding evaluation parties; receiving an evaluation result fed back by the evaluation party according to the evaluation request, and determining a security optimization demand of the business product and a security product needing to be docked with the business product according to the evaluation result; and finally, according to a security access demand of a service product, determining joint debugging example configuration of a security product to be docked with the service product, and according to the joint debugging example configuration and different code segments pre-stored by the service product, generating a final code, so that a service party completes development joint debugging according to the final code. The problem of splitting in the evaluation process is solved, and the evaluation efficiency is improved.

Description

technical field [0001] This specification relates to the field of the Internet, and in particular to a method and device for securely accessing service products. Background technique [0002] When a certain business product needs to be connected to an open platform such as Alipay, there are many payment risks involved, including account theft, cheating risks, cash-out risks, money laundering risks, data leakage risks, system vulnerability risks, and network attack risks, etc. [0003] In order to deal with these risks, the platform security technology department not only provides various security protection products, including data risk control products, content security products, human-machine identification products, etc., but also gives suggestions on business product optimization from a security perspective. In the traditional way, the access process of business products is promoted by business personnel. Due to the relatively long process link of security protection ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q10/04
CPCG06Q10/04G06Q10/0637
Inventor 周红伟
Owner ADVANCED NEW TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More