Terminal permission control method and device

An access control and terminal technology, applied in the computer field, can solve the problems of occupying large resources and complex management process, and achieve the effect of saving resources and simplifying the control process.

Inactive Publication Date: 2017-09-15
SHENZHEN IPANEL TECH LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, if a network application has many permission items, it is necessary to maintain the blacklists of different permission items separately in order to realize t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal permission control method and device
  • Terminal permission control method and device
  • Terminal permission control method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0048] In the current terminal permission control method, a blacklist is created for different functional permissions in the same network application. For the same terminal user, it is necessary to check whether each blacklist contains the unique user ID of the terminal user to determine the terminal user. Therefore, the current terminal authority control process is very complicated and occupies a lot of resources. The present application provides a terminal authority control method, which combines the blacklists corresponding to all functional authorities into a blacklist, that is, a target blacklist; and querying a target blacklist can complete the control of all restricted functions of the terminal user , there is no need to query multiple blacklists, thus simplifying the control process and saving the resources required for the control process.

[0049] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the application provides a terminal permission control method and device. The control method comprises the following steps: writing limited user identifiers corresponding to all function permissions in the same blacklist which is the target blacklist; after acquiring the unique user identifier of the terminal user, judging whether the target blacklist contains the unique user identifier of the terminal user; if the target blacklist contains the unique user identifier of the terminal user, limiting all limited functions of the terminal user. By using the control method disclosed by the embodiment of the invention, the different function permissions can be controlled in unified without independently controlling each function; when receiving a request of one terminal user, the control on all limited functions of the terminal user can be accomplished by only needing to query a target blacklist, the querying on multiple blacklists is unnecessary; therefore, the control process is simplified, and required resource in the control process is saved.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a terminal authority control method and device. Background technique [0002] With the rapid development of Internet technology, various network applications based on the Internet continue to emerge. Many network applications restrict the permissions of end users. For example, for a forum website, some end users are only allowed to like, but not to comment; or, for some end users, they are only allowed to browse, but not Like, comment, etc. [0003] At present, network applications are managed separately for different permissions. For example, end users without comment permission are added to the comment blacklist, that is, users in the comment blacklist do not have comment permission; for example, terminal users without like permission Add to the blacklist of likes, that is, users in the blacklist of likes do not have the permission to like. If the same user has...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/104
Inventor 徐佳宏赵海林何小芬陈恋
Owner SHENZHEN IPANEL TECH LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products