Access control method and apparatus
A technology of access control and access strategy, which is applied in communication and network security related fields to achieve the effects of saving usage, improving utilization rate and saving memory
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0047] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the embodiments and the drawings. Here, the exemplary embodiments of the present invention and the description thereof are used to explain the present invention, but not as a limitation to the present invention.
[0048] The embodiment of the present invention provides one. The present invention will be described in detail below with reference to the drawings.
[0049] Such as Figure 5 The flow chart of the first embodiment of the access control method of the present invention is shown.
[0050] Including step 501, modifying the rules, templates, and masks on the access control devices in the network, adding specific fields related to access control in the custom fields of the template; in the rules corresponding to the custom fields of the template Add the specific value to be controlled ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap