Authority control method, service providing method, device, system and electronic equipment
A technology of authority control and equipment, which is applied in the direction of computer security devices, electronic digital data processing, instruments, etc., and can solve problems such as hidden dangers of access between equipment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0123] 1) The access proxy object corresponding to the access object that initiates the access request may always run in the first device, and the first device may pre-store the correspondence between the access proxy object identifier running on it and the corresponding access object identifier, Therefore, in this step, the access proxy object identifier corresponding to the access object initiating the access request can be obtained by searching the corresponding relationship, and trigger the corresponding access proxy object to initiate a service request to the target service provider object.
[0124] 2) The first device may not store the corresponding relationship described in 1), but after receiving the access request, create an access proxy object corresponding to the access object in this step (the delete after accessing the proxy object), and trigger the access proxy object to initiate a service request to the target service provider object.
[0125] 3) The first devic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


