Huawei technologies co., ltd. (20240126897). ACCESS CONTROL METHOD AND RELATED APPARATUS simplified abstract

From WikiPatents
Jump to navigation Jump to search

ACCESS CONTROL METHOD AND RELATED APPARATUS

Organization Name

huawei technologies co., ltd.

Inventor(s)

Xiaodong Chen of Beijing (CN)

Changting Li of Beijing (CN)

Shengtao Zhang of Beijing (CN)

Guojian Zhao of Beijing (CN)

ACCESS CONTROL METHOD AND RELATED APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240126897 titled 'ACCESS CONTROL METHOD AND RELATED APPARATUS

Simplified Explanation

The patent application describes a method for an electronic device to determine whether to allow access to a resource requested by an operation instruction that does not meet an unlocking requirement.

  • The electronic device is in a locked state.
  • The device receives an operation instruction and identity authentication information.
  • The authentication information does not meet the unlocking requirement.
  • The device decides whether to grant access to the requested resource.
  • If access is granted, the device accesses the resource in response to the operation instruction.

Potential Applications

This technology could be applied in secure systems where access to resources needs to be carefully controlled based on authentication information.

Problems Solved

This technology helps prevent unauthorized access to resources by requiring proper authentication before granting access.

Benefits

The technology enhances security by ensuring that only authorized users can access specific resources on the electronic device.

Potential Commercial Applications

One potential commercial application of this technology could be in the development of secure mobile devices or applications that require strong authentication measures.

Possible Prior Art

One possible prior art for this technology could be existing methods for authentication and access control on electronic devices, such as password protection or biometric authentication.

Unanswered Questions

How does this technology impact user experience on electronic devices?

This technology may enhance user experience by providing a secure environment for accessing resources, but it may also introduce additional steps for authentication that could be seen as cumbersome by some users.

What are the potential vulnerabilities of this technology?

While this technology aims to enhance security, there could be potential vulnerabilities in the authentication process or in the device's ability to accurately determine access rights based on the provided information.


Original Abstract Submitted

after an electronic device in a locked state obtains an operation instruction and identity authentication information that does not meet an unlocking requirement, the electronic device may determine whether to allow access to a resource that the operation instruction requests to access, and if yes, access the corresponding resource in response to the operation instruction.