FIDO hardware-based user operating method and system
An operation method and user technology, applied in the Internet field, can solve problems such as time-consuming, heavy workload of communication protocol modification, and low applicability of communication methods, so as to achieve the effect of saving resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0080] Example 1, user registration method based on FIDO hardware. Such as figure 2 As shown, the network frame diagram of this method is shown. figure 2 Among them, RPClient corresponds to the first module of the mobile terminal, FIDOU2FClientSDK corresponds to the second module of the mobile terminal, RP corresponds to the first server, and IDsManager corresponds to the second server. Among them, the first module and the first server of the mobile terminal are devices that the network provider had before using the FIDO protocol, and the second module and the second server of the mobile terminal are devices provided by the FIDO protocol, that is, the second module of the mobile terminal The module is a newly added module in the user's mobile phone after the network service provider confirms the use of the FIDO protocol. The second server is a server used to assist the first server so that it has the function of the FIDO protocol. From figure 2 It can be seen directly f...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 