Method and device for resource access
A resource access and resource technology, applied in the information field, can solve the problems of inability to ensure access control of the requested device, redundant content, and inability to confirm the permission of the requested device.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0111] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0112] An embodiment of the present invention provides a method for resource access, and the method is applied in a machine-to-machine communication (M2M) system. The method embodiment describes a processing flow of a device to which an accessed resource belongs. Such as figure 1 shown, including the following steps:
[0113] Step 102: Receive an access request from a requester resource to an accessed resource, wherein the access request includes the i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


