Authentication method and system, server and client
An authentication method and client technology, applied in the field of information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.
[0047] figure 2 It is a flow chart of the authentication method in the embodiment of the present invention. Such as figure 2 As shown, this embodiment includes the following steps:
[0048] Step 11, the server generates an authentication code according to the stored client identification, legal user identity information and security configuration information corresponding to the legal user identity information;
[0049] Step 12, the server establishes the corresponding relationship between the authentication code and the client ID, legal user identity information and security configuration information, stores the authentication code, and sends the authentication code to the corresponding client;
[0050] Step 13, the server receives the authentication request sent by the client that includes the client ID and the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com