Method and device for controlling information safety of telecommunications service (TS)
A technology for information security and telecommunication services, applied in the field of information security, can solve problems such as failure to prevent illegal leakage of user information, and achieve the effect of ensuring normal business operations and preventing illegal leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] In order to make the object, technical solution and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0038] In the embodiment of the present invention, figure 1 User information is divided into five parts according to the security level from low to high: basic information, business information, accounting information, key information and sensitive information, and each part includes specific content.
[0039] After the user information is classified according to the security level, the scene element can be determined by the user information query request first, and then judge whether the request is legal. If it is a legal user information query request, the requested user information can be invoked according to the scene element. In this way, during normal business operations, the illegal disclosure of user information is prevented a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com