Secure access method, integrated circuit and computer readable storage medium
A secure access and security technology, applied in the field of communication, can solve problems such as low flexibility, inability to realize device security access control, poor security, etc., and achieve the effect of enhancing the strength of security protection and improving the ability of security access control
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0044] In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention and has no specific meaning by itself. Therefore, 'module', 'part' or 'unit' may be used in combination.
[0045] figure 1It is a schematic flowchart of an embodiment of the secure access method of the present invention. In this embodiment, a secure access method is proposed, which includes the following steps:
[0046] S1. Obtain the security flag signal of the current access event and the identity information of the slave machine;
[0047] S2. Determine the target slave module to be accessed and the security attributes of the target slave module according to the slave identity information;
[0048] S3. Determine whether the security attribute ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com