Plug-in security control method and device and storage medium
A security control and plug-in technology, applied in the direction of program control devices, computer security devices, program control design, etc., can solve problems such as equipment operation safety hazards, achieve effective control, improve stability and security effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] In this embodiment, a plug-in security control method is provided, figure 1 is a flowchart of a plug-in security control method according to Embodiment 1 of the present invention, such as figure 1 As shown, the process includes the following steps:
[0034] Step S102, receiving an access request from the plug-in to the device capability interface;
[0035] Step S104, query the interface permission configuration policy library corresponding to the plug-in, and determine whether the plug-in has access rights to the device capability interface, wherein the interface permission configuration policy library of the plug-in records that the plug-in has access to multiple Access rights to the device capability interface;
[0036] Step S106: Control the plug-in's access to the device capability interface according to the determination result of whether the plug-in has access authority to the device capability interface.
[0037] Through the above steps, when the access reques...
Embodiment 2
[0057] In this embodiment, a plug-in security control device is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0058] figure 2 is a structural block diagram of a plug-in safety control device according to Embodiment 2 of the present invention, such as figure 2 As shown, the device includes a plug-in security authorization execution unit 22, which is used for:
[0059] Receive the access request of the plug-in to the device capability interface;
[0060] Query the interface permission configuration policy library corresponding to the plug-...
Embodiment 3
[0078] An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.
[0079] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:
[0080] Step S1, receiving an access request from a plug-in to a device capability interface;
[0081] Step S2, query the interface permission configuration policy library corresponding to the plug-in, and determine whether the plug-in has access rights to the device capability interface, wherein the interface permission configuration policy library of the plug-in records that the plug-in has access to multiple Access rights to the device capability interface;
[0082] Step S3, controlling the plug-in's access to the device capability interface according to the determination result of whether ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com