A permission control method based on b/s architecture
A technology of permission control and S-architecture, which is applied in program/content distribution protection, instruments, electronic digital data processing, etc., can solve the problems of increasing development and maintenance costs, affecting the normal operation of other modules, and too simple permission control. Improve development efficiency, easy maintenance and expansion, and protect security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the specific embodiments and the accompanying drawings. It should be understood that these descriptions are exemplary only and are not intended to limit the scope of the invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present invention.
[0031] Obviously, the described embodiments are some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
[0032] In addition, the technical features involved in the different embodiments of the present invention described below can ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


