Access control method and device
An access control and legal technology, applied in the field of communication, can solve problems such as data security protection that no solution is proposed and cannot be arbitrarily sensitive, and achieve the effect of flexible and diverse authority control and high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0028] The inventors found that using the method in the related art for authority control has the following defects: First, this control method only controls the above-mentioned specific category authority and data access, which has limitations and cannot secure any sensitive data. Second, this control method does not implement access control from the aspect of application identity authentication, and there is no whitelist mechanism, and there is no complete solution; in addition, there is no authentication protection for the instruction transmission between the application client and server .
[0029] Based on the above considerations, in this embodiment, an access control method is provided, figu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com