Authority control method and device

A technology of authority control and authority, which is applied in the field of network security, can solve problems such as boring and single verification methods for users, loss of enthusiasm for accessing network resources, and no interaction, etc., to achieve the effect of improving user experience

Active Publication Date: 2015-06-10
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the user who initiates the access request can successfully access network resources only if he is an object with a specific identity or an object who knows the answer to a specific question accurately. For users, it is rather boring and single. There is no interaction between the method of limiting the access object and the user who initiates the access request. The user who initiates the access request has no choice but to wait for verification during the process of initiating the access; the method of question answer verification Although there is interaction with the user who initiates the access request, it is limited to the user answering the set questions, and the user who initiates the access request can only answer questions. This is similar to answering an exam, which is boring for users, and for those who do not Users who know the answer to the question will lose their motivation to participate in accessing network resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority control method and device
  • Authority control method and device
  • Authority control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Embodiments of the present invention provide a permission control method and device, which are used to realize interaction with users during permission control and improve user participation enthusiasm.

[0046] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention belong to the protection scope of the present invention. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, prod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authority control method and an authority control device, which are used for realizing interaction with a user in the authority control process to improve the participation positivity of the user. The method comprises the following steps: receiving a network resource access request of the user; sending an application related task to the user according to the access request, wherein the application related task adopts the task type which is required to be executed by the user and related to an application program, and of which a task report is fed back according to the execution situation; acquiring the task report fed back by the user after executing the application related task; if the task report indicates that the user successfully executes the application related task, authorizing the user to access the network resource corresponding to the access request.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a permission control method and device. Background technique [0002] At present, in network applications, when a user accesses a network resource on a website, the user usually needs to initiate a resource access request, and the website needs to detect this request to confirm whether to grant permission to the user, so that the user can continue on the website. To perform operations or view content on the website, the authority control of the website is to control the establishment of the mapping relationship between users and the network resources they access. For example, when a user initiates access to an online community, such as Qzone, Renren, blog (blog), microblog (microblog), etc., the website needs to review the authority of the user. To determine whether the user has access rights, when the user has access rights, the user is allowed to browse the pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
Inventor 张振伟
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products