Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An access control method and device

A technology of access control and callback function, applied in the computer field, can solve the problems of reducing the activity, which is not conducive to guaranteeing the activity, and achieve the effect of improving the activity and giving priority to access.

Active Publication Date: 2019-07-12
ZHUHAI BAOQU TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the registry callback functions of the target client Kingsoft Internet Security are ranked behind, the client was not called for this operation of modifying the system startup items, which reduced its activity in the user's computer.
It can be seen that for an application client, if it registers the callback function relatively late, it is not conducive to ensuring its activity in the user's computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access control method and device
  • An access control method and device
  • An access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] Embodiments of the present invention provide an access control method and device, which are applied to a terminal, and can realize preferential access of a target client and improve the activity of the target client.

[0050] The present invention will be described in detail below through specific examples.

[0051] figure 1 It is a schematic flowchart of an access control method provided by an embodiment of the present invention, which is applied to a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of invention provides an access control method and device. The method includes the concrete implement steps that whether a registry callback function located at the tail of a registry callback function chain table is a target registry callback function or not is monitored; the registry callback function chain table is used for storing information of registry callback functions, and the target registry callback function is the registry callback function corresponding to a target client side; if yes, the target registry callback function is migrated to the head from the tail of the registry callback function chain table, so that in the presence of an access requirement of the client side, the target registry callback function is preferentially called to get access to the target client side. Precedence access to the target client side can be achieved by the access control method and device.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an access control method and device. Background technique [0002] With the increasing development of the Internet, there may be multiple similar application clients installed on the user's computer, and some functions of these application clients can be realized by calling the registry callback function. Specifically, each application client can register its own registry callback function during the startup process of the user's computer, and then call its corresponding registry callback function when realizing the target function. [0003] The registry callback functions of each application client are generally stored in the registry callback function linked list of the system. The order of each registry callback function in the registry callback function linked list is generally related to the time when each application client registers the callback function. For example, re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/445
CPCG06F9/44505
Inventor 李文靖
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products