Secure accessing method and device

A technology for secure access and to-be-accessed, which is applied in the field of secure access methods and devices, and can solve problems such as large security risks in application program access methods, and achieve the effects of avoiding illegal access and improving security.

Active Publication Date: 2017-01-11
SHANGHAI CHUANGGONG COMM TECH
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Embodiments of the present invention provide a secure access method and device to solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure accessing method and device
  • Secure accessing method and device
  • Secure accessing method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0020] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. . Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0021] In order to solve the security problem mentioned in the background art, the embodiment of the present invention provides figure 1 The system architecture diagram shown in figure 1 It includes two parts: smart terminal 01 and cloud server 02. Among them, the wireless communication between smart terminal 01 and cloud server 02 also involves various external gateways 03, and smart terminal 01 specifically includes the first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure accessing method and device wherein the method comprises the following steps: obtaining the accessing right of a first application to a second application when an accessing request of the first application to the second application is monitored wherein the accessing request includes an identification mark of the to-be-accessed information and operations to targets associated with the to-be-accessed information; determining whether the information mark of the to-be-accessed information exists in a preset sensitive information characteristic database or not if the first application has the access right to the second application; if the information mark of the to-be-accessed information exists, obtaining the operation right to the information mark of the to-be-accessed information from the sensitive information characteristic database and determining whether the operations to relevant targets meet the operation right or not; and if the operations to relevant targets meet the operation right, allowing the first application to operate on the targets of the to-be-accessed information so as to solve the safety hazards that largely exist in the program accessing method in the prior art.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and device for secure access. Background technique [0002] With the widespread use of smart mobile terminals, the characteristics of smart mobile terminals that can install new applications at any time, while meeting the requirements of users for the diversity of functions of smart mobile terminals, the security of data stored in smart mobile terminals and smart mobile terminals The issue of the security of account funds has also become increasingly prominent. In the prior art, the protection technology of the Android system for personal information is not strong enough, such as SMS application, address book application, as long as the application is allowed to access the second application when the program package of the new application is installed, then the application has For example, if the second application is an SMS application, the newly installed application can int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/105
Inventor 徐佳
Owner SHANGHAI CHUANGGONG COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products