Access control method, device and system
An access control and access request technology, applied in computer security devices, instruments, digital data authentication, etc., can solve security risks, data leakage and other problems, and achieve the effect of ensuring security and realizing secure access and control.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] Embodiments of the present disclosure are described in detail below, examples of which are illustrated in the drawings, in which the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present disclosure and should not be construed as limiting the present disclosure.
[0037] The access control method, device and system of the embodiments of the present disclosure are described below with reference to the accompanying drawings.
[0038] figure 1 It is a schematic flowchart of an access control method provided by an embodiment of the present disclosure.
[0039] Such as figure 1 As shown, the method includes the following steps:
[0040] In step 101, a first access request for requesting a resource search engine to perform a target operation is obtained from a terminal.
[0041] The e...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


