Resource access authorization method
A resource access and resource technology, applied in the field of resource access authorization and the Internet, can solve the problems of not being easy to implement, not very stable, and not very extensive in access forms.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0121] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to examples. It should be understood that the examples described here are only used to explain the present invention, and are not intended to limit the present invention.
[0122] With the rise of Widgets and the development of mobile terminals and terminal set-top boxes, running Widget applications on terminals has become a trend. However, Widget clients, mobile terminals, and set-top box terminals all have the concept of application containers. If they follow the "resource access authorization process (basic form)", there will be a problem of repeated authentication. In order to avoid repeated authentication, it is necessary to further improve the "resource access authorization process (basic form)" to meet new requirements. That is to say, it has "single user authentication, multiple use, sha...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com