Authentication and access method and authentication system
An access method and authentication information technology, applied in transmission systems, electrical components, etc., can solve the problems of low efficiency, cumbersome authentication access configuration, low authentication integration of authentication service system, etc., and achieve the effect of improving the overall integration.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0017] In order to make the objectives, technical solutions and advantages of the embodiments of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0018] reference figure 1 , Illustrates a schematic diagram of an authentication access method according to an embodiment of the present invention. Specifically, the authentication access method includes:
[0019] S101, log in to the first server through the user name,
[0020] S102: After passing the authentication of the first server, generate an authentication identifier, where the authentication identifier is associated with the time of logging in to the first server;
[0021] S103. Write the user name and the authentication identifier into the database of the first server and the database of one or more second server connected to the first server;
[0022] S104: If the second server is accessed according to the user name through the first server...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap