Huawei technologies co., ltd. (20240134947). ACCESS CONTROL METHOD AND RELATED APPARATUS simplified abstract

From WikiPatents
Revision as of 03:45, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

ACCESS CONTROL METHOD AND RELATED APPARATUS

Organization Name

huawei technologies co., ltd.

Inventor(s)

Xiaodong Chen of Beijing (CN)

ACCESS CONTROL METHOD AND RELATED APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240134947 titled 'ACCESS CONTROL METHOD AND RELATED APPARATUS

Simplified Explanation

The access control method described in the abstract involves a process where an electronic device receives an instruction to open a target application, fails to authenticate the instruction, runs the target application without access to certain data, receives authentication information, and then accesses the data upon successful authentication.

  • Receiving first instruction to open a target application
  • Failing to authenticate the instruction or skipping authentication
  • Running the target application without access to specific data
  • Receiving authentication information
  • Accessing the data through the target application after successful authentication

Potential Applications

This technology could be applied in secure data access systems, digital rights management, and secure application launching.

Problems Solved

This technology helps prevent unauthorized access to sensitive data, enhances security measures for applications, and ensures data privacy.

Benefits

The method enhances data security, protects sensitive information, and provides a secure access control mechanism for applications.

Potential Commercial Applications

One potential commercial application could be in the development of secure mobile applications for banking, healthcare, and other industries requiring data protection.

Possible Prior Art

Prior art in access control methods, authentication processes, and secure data handling systems may exist in the field of cybersecurity and information technology.

Unanswered Questions

How does this method handle multiple authentication attempts?

The abstract does not specify how the system deals with repeated authentication failures or potential security breaches due to multiple attempts.

What types of data are considered "first data" in this context?

The abstract does not clarify the nature or sensitivity of the data that is accessible through the target application after successful authentication.


Original Abstract Submitted

in accordance with an embodiment, an access control method includes: receiving, by an electronic device, a first instruction, wherein the first instruction is used to open a target application; failing, by the electronic device, to authenticate the first instruction, or skipping, by the electronic device, authenticating the first instruction; running, by the electronic device, the target application in response to the first instruction, wherein the electronic device cannot access first data through the target application, and the first data is data accessible to the target application after the electronic device successfully authenticates the first instruction; receiving, by the electronic device, authentication information; and accessing, by the electronic device, the first data through the target application in response to the authentication information being successfully authenticated.