Priority-based module assess control method and server
An access control and priority technology, applied in the network field, can solve problems such as reduced experience, user access failure, and difficulty in instant messaging, and achieve the effect of improving experience.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0016] figure 1 Shown is a flow chart of the component access control method for setting priorities according to the first preferred embodiment of the present invention. figure 2 Shown is a schematic diagram of the server provided according to the first preferred embodiment of the present invention. Please also refer to figure 1 and figure 2 .
[0017] Such as figure 1 As shown, the component access control method for setting priority provided by the first preferred embodiment of the present invention includes steps 101-109. In step 101, the user logs into the community interaction platform according to the registration information, requests the server, and loads component information. Users...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com