Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An access control method and device

An access control and access authority technology, applied in the field of information processing, can solve the problems of complicated and cumbersome user access process, and achieve the effect of improving convenience and simplifying access operations.

Active Publication Date: 2019-05-14
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after the terminal has set different access rights for different users, if the user needs to use a specific resource within the access rights of the terminal, he may need to enter the account number and password first, and then search for the corresponding application icon after the terminal is verified. It is only possible to access specific resources by clicking complex operations such as icons, which makes the user access process complicated and cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access control method and device
  • An access control method and device
  • An access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0047] see figure 1 , which shows a schematic flowchart of an embodiment of an application running method of the present application, the method of this embodiment may include:

[0048] 101. Obtain the currently input fingerprint to be identified.

[0049] It should be noted that the method of the present application can be applied to any device with a fingerprint identification function, such as a touch-screen mobile phone, a fingerprint authentication device, and the like. The u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided in embodiments of the present application are a method and device for access control. The method comprises: acquiring a fingerprint to be recognized currently inputted; matching from a preset fingerprint library a target fingerprint matching the fingerprint to be recognized; determining a target user to whom the target fingerprint belongs; from at least one resource space to which the target user has access permission, determining a target resource space to which the target fingerprint corresponds and a target resource to which access is triggered by the target fingerprint in the target resource space; and accessing the target resource. The method and device increase the degree of convenience for a user in accessing a specific resource space on a terminal.

Description

technical field [0001] The present application relates to the technical field of information processing, and more specifically relates to an access control method and device. Background technique [0002] At present, more and more applications are installed on the terminal, and a large amount of user data will be generated when the user uses the applications. Among the user data generated by the application, some may involve relatively private data of the user, and the user does not want others to obtain these private data when using the terminal. In order to protect the user's private data from being seen by others, different access rights of different users to resources accessible in the terminal can be set on the terminal, for example, different applications or storage spaces that different users can access are different. However, after the terminal has set different access rights for different users, if the user needs to use a specific resource within the access rights ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/32
CPCG06F21/32
Inventor 刘东海许奕波张碧君
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products