Method for user security management of important system
A system user and security management technology, applied in the direction of user identity/authority verification, message/mail/notification, etc., can solve problems such as malicious use of the system and theft of system passwords, and achieve the effect of improving system security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0006] The pile test system of the vehicle management institute adopts the C / S development mode. After the system user enters the user name and password to successfully log in to the system, the background management program of the system will randomly generate a 6-digit verification code and send it to the user. Enter the verification code for verification.
[0007] The process of this embodiment is:
[0008] During operator maintenance, each operator is bound with the user’s mobile phone number, and the machine running the background management program is equipped with a text message sending device. However, when the user successfully logs in to the system, the system writes the login information into the login information table. The background management program can know that the user has successfully logged in within a few seconds, and the system immediately randomly generates a 6-digit verification code. verify.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com