Identity authorization controlling method and system
An authorization control and identity technology, applied in the field of identity authorization control methods and systems, can solve problems such as low efficiency, and achieve the effects of avoiding costs, saving costs, and improving the efficiency of identity authorization.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] The present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings, but the embodiments of the present invention are not limited thereto.
[0018] Such as figure 1 As shown, it is a schematic flow diagram of an embodiment of the identity authorization control method of the present invention, including steps:
[0019] Step S101: the first terminal encrypts the authorization data according to a preset encryption algorithm, obtains the encrypted authorization data, and sends the encrypted authorization data to the second terminal;
[0020] The authorization data is the data corresponding to the non-contact card reader performing the authorization removal operation. Further, the contactless card reader can judge whether the authorization data is correct according to the authorization data, thereby judging whether to perform the operation of removing the authorization of the control object. The encryption algorithm ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com