Access control method and device

An access control and legal technology, applied in the field of communication, can solve problems such as data security protection that no solution is proposed and cannot be arbitrarily sensitive, and achieve the effect of flexible and diverse authority control and high security

Inactive Publication Date: 2016-01-27
ZTE CORP
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Using this method to control permissions only controls the above-mentioned specific categories of permissions and data access, which has limitations and cannot provide security protection for any sensitive data.
[0007] Aiming at the limitation of access data access control methods in related technologies, no effective solution has been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0028] The inventors found that using the method in the related art for authority control has the following defects: First, this control method only controls the above-mentioned specific category authority and data access, which has limitations and cannot secure any sensitive data. Second, this control method does not implement access control from the aspect of application identity authentication, and there is no whitelist mechanism, and there is no complete solution; in addition, there is no authentication protection for the instruction transmission between the application client and server .

[0029] Based on the above considerations, in this embodiment, an access control method is provided, figu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an access control method and device. The access control method comprises: obtaining an identification key of an application for assign data access, the identification key being generated by reading a hardware key from a dwell vessel or an independent security chip according to the identification of the application; determining whether the application is legal or not according to the identification key; and controlling the application for the assign data access according to the determination result. Through adoption of the access control method and device, the problem that right control modes of data access in correlation techniques having limitations is solved, the right control of data access may be more flexible, and the safety is much higher.

Description

technical field [0001] The present invention relates to the communication field, in particular to an access control method and device. Background technique [0002] With the increasing number of applications on smartphones, many applications need to access user data on the mobile phone, such as social applications need to access the address book, navigation applications need to access the location of the mobile phone, and authentication software needs to access the mobile phone ID I didn't realize that the information of the mobile phone was read by the application, and it often happened that some applications accessed some data that was not related to itself, which provided opportunities for information leakage. [0003] At present, the industry basically adopts the following methods for the permission control of application access data: [0004] A. Check the application's access to private permissions, such as: making calls, sending messages, reading contacts, reading mes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0853
Inventor 沙爽
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products