Authentication and access method and authentication system
An access method and authentication information technology, applied in transmission systems, electrical components, etc., can solve the problems of low efficiency, cumbersome authentication access configuration, low authentication integration of authentication service system, etc., and achieve the effect of improving the overall integration.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0018] refer to figure 1 , which illustrates a schematic diagram of an authentication access method according to an embodiment of the present invention. Specifically, the authentication access method includes:
[0019] S101, log in to the first server through the user name,
[0020] S102. After passing the authentication of the first server, generate an authentication identifier, where the authentication identifier is associated with the time of logging in to the first server;
[0021] S103, writing the user name and the authentication identifier into the database of the first server and the database of one or more second servers connected to the first server;
[0022] S104, if the first server accesses the second server according to the use...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com