A permission audit method and device

A technology for accessing users with authority and unauthorized access, applied in the field of communication, can solve problems such as the inability to implement business authority audits, and achieve the effect of satisfying security management and avoiding security risks

Active Publication Date: 2018-12-07
CHINA MOBILE GROUP JILIN BRANCH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a permission audit method and device to solve the technical problem in the prior art that relying on manual analysis and the system's own permission control cannot meet the requirements of business permission audit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A permission audit method and device
  • A permission audit method and device
  • A permission audit method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some of the embodiments of the present invention, rather than all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0047] figure 1 It is a schematic flow chart corresponding to an authority audit method provided by the embodiment of the present invention, the method includes steps 101 to 103:

[0048] Step 101, obtaining the current usage authority category of the system to be audited;

[0049] Step 102: Comparing the current use authority category with the authority category set by the system to be audited to obtain the newly added authority in vi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a permission checking method and device. The embodiment of the present invention obtains the current use authority category of the system to be audited; compares the current use authority category with the authority category set by the system to be audited to obtain newly added authority in violation of regulations and unused authority; according to the The application traffic log of the system to be audited obtains the relationship between the user and the use authority to obtain the high-frequency access user; the relationship between the user and the use authority and the relationship between the user and the set authority set by the system to be audited are obtained to obtain the unauthorized access user; The embodiment of the invention realizes the acquisition of newly-violated permissions and unused permissions in the system to be audited, as well as high-frequency access users and unauthorized access users, thereby effectively avoiding security risks in the system to be audited and meeting the security management requirements of the system to be audited need.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for checking authority. Background technique [0002] At present, all kinds of application systems in the business support system use the system's own authority management module to identify and control the access authority of the application system. Its main business model includes the following steps: Step 1, during the development and launch process of the application system, register and release management of system permissions, and all system permissions are managed by the system's own permission management module; Step 2, the administrator According to the business access needs of the application system, the user's access authority is defined, and the identification information of the operation access authority is set; Step 3, the user logs in to the application system using the assigned operation authority identification information; the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31H04W24/00
Inventor 徐党生于雷杨宇刘赫
Owner CHINA MOBILE GROUP JILIN BRANCH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products