Privacy data protection method with self-adjustment of access time
A technology of access time and privacy data, which is applied in the field of information security, can solve the problems that users cannot access data, cannot satisfy users, cannot automatically extend, etc., and achieve the effect of protecting sensitive information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0062] Example 1: If the current client program is a shopping platform, after user James logs in the client, he clicks to view all order pages, which is a privacy information page, and the client program checks that he has not logged in to this page before, and then go to step 2- 2 continue to execute;
example 2
[0063] Example 2: If the current client program is a shopping platform, after the user Joy logs in to the client, clicks to view all order pages, the client program checks that Joy has logged in to the private page before, and proceeds to steps 2-4 to continue.
[0064] Step 2-2: The user logs in and enters the password. If the user identity verification is passed, go to step 2-3 to continue; otherwise, the user needs to log in again to verify the identity;
example 1
[0065] Example 1: The user James logs in and enters the password, and the identity verification is successful. Go to steps 2-3 to continue.
[0066] Step 2-3: Determine whether the current temporary parameter temp is empty, if it is empty, set the old temporary parameter variable oldTemp=null; if it is not empty, set oldTemp=temp. The client program generates a new temporary parameter newTemp, go to steps 2-7 to continue execution;
[0067] Example 1: The user James generates a new temporary parameter of 650cf9febcac76ed, sets oldTemp=null, and proceeds to step 2-7 to continue.
[0068] Step 2-4: The client program checks whether the temporary parameter (temp) has expired. If the current time is within the validity period of the temporary parameter, it is said that the temporary parameter (temp) has not expired and proceeds to step 2-5; otherwise, proceeds to step 2- 6 continue to execute;
[0069] Example 2: The client checks whether the temporary parameter temp has expired...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


