Method for carrying out identity recertification on particular operation of information system by using Usb key technology
A special operation and information system technology, applied in digital data authentication, instruments, electronic digital data processing, etc., can solve problems such as large investment in research and development, inability to achieve large-scale promotion, and legal users cannot log in.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0018] The comprehensive toll collection system of the vehicle management office adopts the C / S development model. When the user performs free operation, the system must perform Usb Key authentication. Only after the authentication is passed, the free operation is allowed.
[0019] The process of this embodiment is:
[0020] When the system administrator authorizes the user, if there is free operation permission, the system prompts to insert a Usb Key, and the system reads the unique serial number of the Usb Key and writes it into the corresponding record of the user. When the user performs free operation, it must Insert the Usb Key for identity authentication, and only after passing can the free operation be performed.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com