18547700. ACCESS CONTROL METHOD, ELECTRONIC DEVICE, AND SYSTEM simplified abstract (Huawei Technologies Co., Ltd.)
Contents
- 1 ACCESS CONTROL METHOD, ELECTRONIC DEVICE, AND SYSTEM
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 ACCESS CONTROL METHOD, ELECTRONIC DEVICE, AND SYSTEM - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
ACCESS CONTROL METHOD, ELECTRONIC DEVICE, AND SYSTEM
Organization Name
Inventor(s)
ACCESS CONTROL METHOD, ELECTRONIC DEVICE, AND SYSTEM - A simplified explanation of the abstract
This abstract first appeared for US patent application 18547700 titled 'ACCESS CONTROL METHOD, ELECTRONIC DEVICE, AND SYSTEM
Simplified Explanation
The patent application describes a method, device, and system for access control to run different instances when a callee provides services for different callers, maintaining isolation between memory data of the instances to ensure data security.
- The innovation allows for running different instances when a callee provides services for different callers.
- The method ensures isolation between memory data of the different instances to prevent abuse, misuse, or leakage of data.
- The system resolves the problem of memory data being compromised and enhances data security.
Potential Applications
The technology can be applied in various industries such as telecommunications, cloud computing, and data security to manage access control efficiently.
Problems Solved
The technology addresses the issue of memory data abuse, misuse, and leakage, ensuring data security and privacy for different callers accessing services from a single callee.
Benefits
- Enhanced data security and privacy - Efficient access control management - Prevention of data abuse, misuse, or leakage
Potential Commercial Applications
"Enhancing Data Security in Telecommunications and Cloud Computing"
Possible Prior Art
There may be existing access control methods, devices, and systems in the field of data security and telecommunications that address similar issues of memory data isolation and data security.
Unanswered Questions
How does the innovation impact the performance of the electronic device?
The article does not provide details on how the access control method may affect the performance of the electronic device implementing the technology.
Are there any limitations to the scalability of the system?
The scalability of the system in handling a large number of instances and callers simultaneously is not discussed in the article.
Original Abstract Submitted
This application discloses an access control method, an electronic device, and a system, so as to run different instances when a callee provides services for different callers, and keep isolation between memory data of the different instances. This resolves a problem that memory data of each caller is abused, misused, or leaked, and ensures data security.