Unlock instant, AI-driven research and patent intelligence for your innovation.

A permission control method and device

An access control and user technology, applied in the field of network security, can solve the problems of boring and simple authentication method, no interaction, loss of enthusiasm for accessing network resources and participation, and achieve the effect of improving the user experience

Active Publication Date: 2021-08-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the user who initiates the access request can successfully access network resources only if he is an object with a specific identity or an object who knows the answer to a specific question accurately. For users, it is rather boring and single. There is no interaction between the method of limiting the access object and the user who initiates the access request. The user who initiates the access request has no choice but to wait for verification during the process of initiating the access; the method of question answer verification Although there is interaction with the user who initiates the access request, it is limited to the user answering the set questions, and the user who initiates the access request can only answer questions. This is similar to answering an exam, which is boring for users, and for those who do not Users who know the answer to the question will lose their motivation to participate in accessing network resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A permission control method and device
  • A permission control method and device
  • A permission control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Embodiments of the present invention provide a permission control method and device, which are used to realize interaction with users during permission control and improve user participation enthusiasm.

[0046] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention belong to the protection scope of the present invention. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, prod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses an authority control method and device, which are used to realize interaction with users during authority control and improve user participation enthusiasm. The method in the embodiment of the present invention includes: receiving a user's access request to network resources; sending an application-related task to the user according to the access request, and the application-related task is a task that needs to be executed by the user and is fed back according to the execution status The reported task type associated with the application; obtain the task report fed back by the user after performing the application-related task; if the task report indicates that the user has successfully performed the application-related task, send The user grants permission to access the network resource corresponding to the access request.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a permission control method and device. Background technique [0002] At present, in network applications, when a user accesses a network resource on a website, the user usually needs to initiate a resource access request, and the website needs to detect this request to confirm whether to grant permission to the user, so that the user can continue on the website. To perform operations or view content on the website, the authority control of the website is to control the establishment of the mapping relationship between users and the network resources they access. For example, when a user initiates access to an online community, such as Qzone, Renren, blog (blog), microblog (microblog), etc., the website needs to review the authority of the user. To determine whether the user has access rights, when the user has access rights, the user is allowed to browse the pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
Inventor 张振伟
Owner TENCENT TECH (SHENZHEN) CO LTD