Terminal permission control method and device
An access control and terminal technology, applied in the computer field, can solve the problems of occupying large resources and complex management process, and achieve the effect of saving resources and simplifying the control process.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0048] In the current terminal permission control method, a blacklist is created for different functional permissions in the same network application. For the same terminal user, it is necessary to check whether each blacklist contains the unique user ID of the terminal user to determine the terminal user. Therefore, the current terminal authority control process is very complicated and occupies a lot of resources. The present application provides a terminal authority control method, which combines the blacklists corresponding to all functional authorities into a blacklist, that is, a target blacklist; and querying a target blacklist can complete the control of all restricted functions of the terminal user , there is no need to query multiple blacklists, thus simplifying the control process and saving the resources required for the control process.
[0049] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2023 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap