Huawei technologies co., ltd. (20240134947). ACCESS CONTROL METHOD AND RELATED APPARATUS simplified abstract
Contents
- 1 ACCESS CONTROL METHOD AND RELATED APPARATUS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 ACCESS CONTROL METHOD AND RELATED APPARATUS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
ACCESS CONTROL METHOD AND RELATED APPARATUS
Organization Name
Inventor(s)
ACCESS CONTROL METHOD AND RELATED APPARATUS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240134947 titled 'ACCESS CONTROL METHOD AND RELATED APPARATUS
Simplified Explanation
The access control method described in the abstract involves a process where an electronic device receives an instruction to open a target application, fails to authenticate the instruction, runs the target application without access to certain data, receives authentication information, and then accesses the data upon successful authentication.
- Receiving first instruction to open a target application
- Failing to authenticate the instruction or skipping authentication
- Running the target application without access to specific data
- Receiving authentication information
- Accessing the data through the target application after successful authentication
Potential Applications
This technology could be applied in secure data access systems, digital rights management, and secure application launching.
Problems Solved
This technology helps prevent unauthorized access to sensitive data, enhances security measures for applications, and ensures data privacy.
Benefits
The method enhances data security, protects sensitive information, and provides a secure access control mechanism for applications.
Potential Commercial Applications
One potential commercial application could be in the development of secure mobile applications for banking, healthcare, and other industries requiring data protection.
Possible Prior Art
Prior art in access control methods, authentication processes, and secure data handling systems may exist in the field of cybersecurity and information technology.
Unanswered Questions
How does this method handle multiple authentication attempts?
The abstract does not specify how the system deals with repeated authentication failures or potential security breaches due to multiple attempts.
What types of data are considered "first data" in this context?
The abstract does not clarify the nature or sensitivity of the data that is accessible through the target application after successful authentication.
Original Abstract Submitted
in accordance with an embodiment, an access control method includes: receiving, by an electronic device, a first instruction, wherein the first instruction is used to open a target application; failing, by the electronic device, to authenticate the first instruction, or skipping, by the electronic device, authenticating the first instruction; running, by the electronic device, the target application in response to the first instruction, wherein the electronic device cannot access first data through the target application, and the first data is data accessible to the target application after the electronic device successfully authenticates the first instruction; receiving, by the electronic device, authentication information; and accessing, by the electronic device, the first data through the target application in response to the authentication information being successfully authenticated.