18541667. ACCESS CONTROL METHOD AND RELATED APPARATUS simplified abstract (Huawei Technologies Co., Ltd.)

From WikiPatents
Revision as of 06:23, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

ACCESS CONTROL METHOD AND RELATED APPARATUS

Organization Name

Huawei Technologies Co., Ltd.

Inventor(s)

Xiaodong Chen of Beijing (CN)

ACCESS CONTROL METHOD AND RELATED APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18541667 titled 'ACCESS CONTROL METHOD AND RELATED APPARATUS

Simplified Explanation

The access control method described in the abstract involves a process where an electronic device receives an instruction to open a target application, fails to authenticate the instruction, runs the target application without access to certain data, receives authentication information, and then accesses the data upon successful authentication.

  • Receiving first instruction to open target application
  • Failing to authenticate or skipping authentication of the instruction
  • Running target application without access to specific data until authentication
  • Receiving authentication information
  • Accessing data through target application upon successful authentication

Potential Applications

This technology could be applied in secure data access systems, authentication processes, and information protection mechanisms.

Problems Solved

This technology helps prevent unauthorized access to sensitive data, enhances security measures, and ensures data privacy.

Benefits

The benefits of this technology include improved data security, enhanced user privacy, and strengthened authentication processes.

Potential Commercial Applications

Potential commercial applications for this technology include secure data storage systems, authentication software, and privacy protection tools.

Possible Prior Art

One possible prior art for this technology could be existing access control methods in electronic devices and authentication systems.

Unanswered Questions

How does this technology compare to traditional access control methods?

This article does not provide a direct comparison between this technology and traditional access control methods.

What are the potential limitations of this technology in real-world applications?

The article does not address any potential limitations or challenges that may arise when implementing this technology in real-world scenarios.


Original Abstract Submitted

In accordance with an embodiment, an access control method includes: receiving, by an electronic device, a first instruction, wherein the first instruction is used to open a target application; failing, by the electronic device, to authenticate the first instruction, or skipping, by the electronic device, authenticating the first instruction; running, by the electronic device, the target application in response to the first instruction, wherein the electronic device cannot access first data through the target application, and the first data is data accessible to the target application after the electronic device successfully authenticates the first instruction; receiving, by the electronic device, authentication information; and accessing, by the electronic device, the first data through the target application in response to the authentication information being successfully authenticated.