Supercharge Your Innovation With Domain-Expert AI Agents!

Information access method, device and equipment

A technology of information access and access restriction, applied in the field of communication, can solve problems such as inability to access each other, and achieve the effect of solving the inability to access each other, enhancing interaction capabilities, and improving efficiency

Active Publication Date: 2017-05-17
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the above technical problems, the embodiment of the present invention expects to provide an information access method, device and equipment, which solves the problem that many application programs cannot access each other in the existing technical solutions, improves efficiency, and strengthens the communication between users and terminals. interaction between

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information access method, device and equipment
  • Information access method, device and equipment
  • Information access method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0048] An embodiment of the present invention provides an information access method, referring to figure 1 As shown, the method includes the following steps:

[0049] Step 101, when it is detected that the first application program needs to access the second application program, determine whether the first application program has permission to access the second application program.

[0050] Specifically, in step 101, when it is detected that the first application program needs to access the second application program, judging whether the first application program has the right to access the second application program may be implemented by the terminal. The terminal may be a terminal capable of installing various application programs, preferably an intelligent terminal capable...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an information access method. The method comprises, when a first application is detected to access a second application, determining whether the first application have the authority to access the second application; if not, obtaining access restriction rules; based on the access restriction rules, determining a third application, which is determined to be capable of accessing the second application on the basis of the access restriction; access the second application through the third application. The embodiment of the invention also discloses an information access device and equipment.

Description

technical field [0001] The present invention relates to information processing technology in the communication field, in particular to an information access method, device and equipment. Background technique [0002] With the promotion, popularization and development of electronic products, electronic products have more and more functions and stronger performance, and more and more application programs are installed on terminals such as mobile phones. Because current users like to store some important information such as their personal information in the terminal, based on security considerations, various applications for user protection of terminal security will be installed on the terminal. These applications for protecting terminal security will restrict the access rights of some applications to some specific applications, and the access rules of the access rights are mostly set with the relationship chain based on the process. [0003] In the existing technology, only 3...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/52G06F21/54
CPCG06F21/52G06F21/54G06F2221/2141
Inventor 廖学州
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More