Authentication methods for distributed storage
A technology of distributed storage and authentication method, applied in the field of distributed storage authentication, can solve problems such as unsolved leakage, and achieve the effects of protecting independence, strong adaptability, and strong fault tolerance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] Embodiments of the present invention will be described below with reference to the drawings. Elements and features described in one drawing or one embodiment of the present invention may be combined with elements and features shown in one or more other drawings or embodiments. It should be noted that representation and description of components and processes that are not related to the present invention and known to those of ordinary skill in the art are omitted from the drawings and descriptions for the purpose of clarity.
[0022] figure 1 It is a flowchart of an implementation mode of the authentication method applicable to distributed storage in the present invention.
[0023] Such as figure 1 As shown, in this embodiment, authentication methods applicable to distributed storage include:
[0024] S10: The login module sends a login request to the authentication module. Specifically, the login module sends a login request including the login user name to the auth...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com