Access control method and device

  • US 10,645,633 B2
  • Filed: 06/12/2016
  • Issued: 05/05/2020
  • Est. Priority Date: 08/13/2015
  • Status: Active Grant
First Claim
Patent Images

1. An access control method, performed by a terminal, the method comprising:

  • after a first connection of a first application of the terminal is established between the terminal and a network and before an access control judgment is made for a second application of the terminal, when a network access request of the second application is acquired, acquiring identification information of the second application;

    acquiring a blocking parameter of the second application according to the identification information, comprising;

    acquiring an access control category of the second application according to the identification information; and

    acquiring the blocking parameter of the second application according to the access control category, wherein, the blocking parameter comprises at least one of a blocking time or a blocking probability;

    acquiring an access control category of the first application;

    comparing a priority of the access control category of the second application with a priority of the access control category of the first application;

    when the priority of the access control category of the second application is lower than the priority of the access control category of the first application, making the access control judgment for the second application according to the blocking parameter, to obtain a judgment result indicating whether the second application is allowed to perform network communication; and

    when the judgment result indicates that the second application is allowed to perform network communication, establishing a second connection between the terminal and the network for the second application or allowing the second application to deliver information on the first connection;

    when the judgment result indicates that the second application is not allowed to perform network communication, establishing a blocking timer; and

    blocking all network communication of the second application within a timing period of the blocking timer.

View all claims
    ×
    ×

    Thank you for your feedback

    ×
    ×