A permission control method and device
An access control and user technology, applied in the field of network security, can solve the problems of boring and simple authentication method, no interaction, loss of enthusiasm for accessing network resources and participation, and achieve the effect of improving the user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] Embodiments of the present invention provide a permission control method and device, which are used to realize interaction with users during permission control and improve user participation enthusiasm.
[0046] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention belong to the protection scope of the present invention. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, prod...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


