Jianchuang Ning, Bin Tan, Yeyu Liang. Treasury Pattern Analysis and Application Based on Security Control Platform[J]. Telecommunications science, 2013, 29(6): 170-176.
Jianchuang Ning, Bin Tan, Yeyu Liang. Treasury Pattern Analysis and Application Based on Security Control Platform[J]. Telecommunications science, 2013, 29(6): 170-176. DOI: 10.3969/j.issn.1000-0801.2013.06.029.
In order to reduce illegal operations and customer information disclosure of risk caused by the high privilege account abuse
drawing lessons from the way of the bank vault management in warehouse that must switch consist of two warehouse keepers who jointly conduct the warehouse
high authority for supervision and control was used in many means of checks and balances. Through the investigation and analysis of various application scenarios for Guangxi mobile network operation center treasury management
trigger mode
authorization model and working efficiency optimization of treasury management were analyzed
designed and implemented. And it was successfully implemented and applicated in the systems such as voice switching network
WAP and signaling monitoring in network operation center. The results show the query sensitive data volume decrease significantly
and it can effectively curb the abuse of authority of the customer and reduce the risks of disclosure of sensitive information.