Authentication method, device and system
An authentication method and authentication code technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as poor user experience and resource waste, and achieve the effect of improving user experience and saving network resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0058] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0059] refer to figure 1 , is a flowchart of an embodiment of an authentication method in the present invention.
[0060] Step S 101. The client sends an access request to the application server;
[0061] When the client needs to initiate a certain business, it first sends an access request to the application server.
[0062] Step S102, the application server forwards the access request to the authentication gateway;
[0063] After receiving the access request sent by the client, the application server forwards the access request carrying the domain name of the application server to the authentication gateway according to preset rules.
[0064] Step S103, the authentication gateway returns an access response message carrying temporary authentication information;
[0065] Since the access request does not contain a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com