Method of implementing mobile phone terminal access authority authentication
A mobile phone terminal and access authority technology, applied in user identity/authority verification, access restrictions, security devices, etc., can solve the problems of poor control flexibility and complicated process of requesting URL resources by mobile phone terminals.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] Various preferred embodiments of the present invention will be described in detail below.
[0024] Such as figure 1 As shown, the mobile terminal finally sends the request to the WAP gateway device through various network devices on the wireless side. Mobile phone terminal accesses the WWW server (being the URL resource mentioned in the present invention) on the Internet, then mobile phone request is forwarded to WWW server, and WWW server responds to WAP gateway, and WAP gateway does some conversions and analyzes and then passes response through wireless side The network equipment of the mobile terminal is sent to the mobile terminal, which completes a complete interaction of the mobile terminal surfing the Internet, and the process ends.
[0025] In the above control flow, the present invention needs to be configured on the front-end operation and maintenance interface, and the configuration data is synchronized to the background business processor, and the business ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 