Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal permission control method and device

An access control and terminal technology, applied in the computer field, can solve the problems of occupying large resources and complex management process, and achieve the effect of saving resources and simplifying the control process.

Inactive Publication Date: 2017-09-15
SHENZHEN IPANEL TECH LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, if a network application has many permission items, it is necessary to maintain the blacklists of different permission items separately in order to realize the management and control of different functional permissions. The management process will be very complicated, and the management process will take up a lot of resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal permission control method and device
  • Terminal permission control method and device
  • Terminal permission control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In the current terminal authority control method, a blacklist is created for different functional authorities in the same network application. For the same terminal user, it is necessary to check whether each blacklist contains the unique user identifier of the terminal user to determine the terminal user. Corresponding to all restricted functions, therefore, the current terminal authority control process is very complicated and takes up a lot of resources. This application provides a terminal authority control method, which combines the blacklists corresponding to all functional authorities into one blacklist, that is, the target blacklist; querying a target blacklist can complete the control of all restricted functions of the terminal user , there is no need to query multiple blacklists, so the control process is simplified and the resources required for the control process are saved.

[0049] In order to make the purpose, technical solutions and advantages of the emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the application provides a terminal permission control method and device. The control method comprises the following steps: writing limited user identifiers corresponding to all function permissions in the same blacklist which is the target blacklist; after acquiring the unique user identifier of the terminal user, judging whether the target blacklist contains the unique user identifier of the terminal user; if the target blacklist contains the unique user identifier of the terminal user, limiting all limited functions of the terminal user. By using the control method disclosed by the embodiment of the invention, the different function permissions can be controlled in unified without independently controlling each function; when receiving a request of one terminal user, the control on all limited functions of the terminal user can be accomplished by only needing to query a target blacklist, the querying on multiple blacklists is unnecessary; therefore, the control process is simplified, and required resource in the control process is saved.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a terminal authority control method and device. Background technique [0002] With the rapid development of Internet technology, various network applications based on the Internet continue to emerge. Many network applications restrict the permissions of end users. For example, for a forum website, some end users are only allowed to like, but not to comment; or, for some end users, they are only allowed to browse, but not Like, comment, etc. [0003] At present, network applications are managed separately for different permissions. For example, end users without comment permission are added to the comment blacklist, that is, users in the comment blacklist do not have comment permission; for example, terminal users without like permission Add to the blacklist of likes, that is, users in the blacklist of likes do not have the permission to like. If the same user has...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/104
Inventor 徐佳宏赵海林何小芬陈恋
Owner SHENZHEN IPANEL TECH LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More