Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method and device

An access control and access condition technology, applied in the Internet field, can solve problems such as spending a lot of time accessing, poor timeliness, and not wanting user system modules to access

Inactive Publication Date: 2018-11-23
TAIKANG LIFE INSURANCE CO LTD +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The inventor researched the process of users accessing various system modules and found that in specific access scenarios, the system administrator does not want users to access all system modules in some specific scenarios, such as the system modules containing e-commerce modules At this time, enterprise managers do not want employees to spend a lot of time accessing the e-commerce module for shopping during work, which will affect work efficiency
Existing system managers generally notify users which system modules cannot be accessed in certain scenarios by sending notifications, and the timeliness of the specific implementation process is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0044] The invention is applicable to numerous general purpose or special purpose computing device environments or configurations. For example: personal computer, server computer, handheld or portable device, tablet type device, multiprocessor device, distributed computing environment including any of the above devices or devices, etc.

[0045] An embodiment of the present invention provides an access control method, which can be applied to a variety of termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access control method, comprising: when receiving a user's access request for a target system, acquiring current personal information of the user; determining, according to the personal information and a preset module access condition in the target system, each target module that the user currently has access rights, the target modules being system modules in the target system; and displaying the respective target modules to the user, so that the user accesses each target module. According to the access control method, when a user's access request for the target system is received, each system module that the user currently has access rights in the target system is determined, and the system modules that the user currently has access rights are used as target modules and displayed to the user for the user to access, so that the rights of the user to access each system module in the target system are controlled. Only the system modules that the user currently has access rights are displayed, so the control effect is stronger.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an access control method and device. Background technique [0002] With the rapid development of Internet technology, system modularization has become a new research and development trend, such as win8, win10 and other operating systems that are currently widely used, and the display interface of the operating system is displayed in the form of system modules. During the modularization process of the system, each system module corresponds to a specific system function. When updating a certain system function, it is only necessary to operate the corresponding system module without changing the overall structure of the system, which is convenient. The management of each function of the system also enables the system to be presented in a variety of ways. When the user accesses the system, the user can access the corresponding function page of the system by operating each syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/102
Inventor 李彦奇
Owner TAIKANG LIFE INSURANCE CO LTD