Information access control method and apparatus
A technology of information access and control methods, which is applied in the field of information access control methods and devices, and can solve problems such as user privacy leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0020] It should be noted that the ordinal numerals such as "first" and "second" are used in the embodiments of the present invention, but these words are only used to distinguish the elements of the present invention, and do not include the order of the elements or other factors. .
[0021] figure 1 It shows the implementation process of the information access control method provided by the embodiment of the present invention. As an example, the terminal can be a personal computer (Personal Computer, PC), a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a mobil...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 