Access control method and device
An access control and data access technology, applied in the network field, can solve problems affecting business execution efficiency and low database performance, and achieve the effect of improving business processing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.
[0031] figure 1 is an application scenario diagram of an access control method shown according to an exemplary embodiment, such as figure 1 As shown, this scenario takes registration on a website as an example. Assume that a user uses his laptop computer to register on a website, and the registered user name submitted is, for example, "youyou", and the user's computer can be called the first cl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 