Authorization control method, authorization method, device and computing device
A technology of authorization control and authorization documents, applied in computing, computer security devices, instruments, etc., to avoid misappropriation, maintain copyright, prevent leakage and reuse
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] An exemplary embodiment of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although the exemplary embodiments of the present disclosure are shown in the drawings, it is understood that the present disclosure can be implemented in various forms and should not be restricted herein. Instead, it is provided to provide more thoroughly understood the present disclosure, and can communicate the scope of the disclosure to those skilled in the art.
[0029] figure 1 A schematic diagram of an application authorization system 100 in accordance with one embodiment of the present invention is shown.
[0030] Such as figure 1 As shown, the application authorization system 100 includes one or more client 110, and server 120 corresponding to the application. It should be noted that the application authorization system 100 of the present invention is in an offline environment that is not connected to the Internet, and the client 11...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


