Method, apparatus and system for making access control strategy
An access control strategy and strategy technology, applied in the network field, can solve problems such as complex operation of the control terminal, and achieve the effects of high formulation efficiency, intuitive location selection, and simple operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] In order to make the objectives, technical solutions and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below with reference to the accompanying drawings.
[0041] figure 1 is an architecture diagram of an access control policy formulation system provided by an embodiment of the present invention, such as figure 1 As shown, the system may include a resource server 10 , a control terminal 20 and a positioning server 30 . Wherein, the control terminal 20 can be a smart phone or a computer; each server in the resource server 10 and the positioning server 30 can be a server, a server cluster composed of several servers, or a server Cloud computing service center. The resource server 10, the control terminal 20 and the positioning server 30 may establish a connection through a wired network or a wireless network, and the control terminal 20 may register a user account in the resource server 10 to ob...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com