User Authentication and Authorization System
A technology for verifying authorization and user identity, which is applied in the field of user identity verification and authorization system, and can solve problems such as leakage, user information leakage, and user information theft.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] The method adopted by the present invention to achieve the intended purpose of the invention will be further described below in conjunction with the accompanying drawings and preferred embodiments of the present invention.
[0032] The invention relates to a user identity verification and authorization system, which is suitable for multi-user accessible equipment, such as shared remote computer equipment or telephone equipment. Please refer to Figure 1 to Figure 3 As shown, it is a functional block diagram of the system. The user authentication and authorization system includes a smart card 10, a client device 20, a system server 30 and a creation module 40, wherein:
[0033] The smart card 10 stores a key information that can be read and written repeatedly. The key information can be a user identification (ID) code or a personal identification number (Personal Identification Number, PIN) or include a user identification code and a personal identification number, but i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 