Authentication and certification method and system
An authentication method and business method technology, applied in transmission systems, electrical components, etc., can solve the problems of insufficient fine-grained permission processing, no security verification on the server side, and insufficient security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0041] figure 2 is a flowchart showing the authentication and authentication method according to the present invention.
[0042] refer to figure 2 , the authentication and authentication method according to the present invention includes: step S202, pre-configuring the authority model and configuration file, wherein the authority model is used to define authority data storage; step S204, when the client calls the business method of the server, the server Models and configuration files are authenticated and authenticated.
[0043] image 3 is a block diagram showing the structure of the authentication and authentication system according to the present invention.
[0044] refer to image 3, the authentication and authentication system 30 according to the present invention includes: authority model configuration means 302, used to pre-configure the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com