Authority adding method, device, and system, and authority addition requesting method and device
A technology for adding requests and authentication requests, applied in the computer field, can solve the problem of complex and single user rights adding process, and achieve the effect of improving efficiency and convenience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0047] figure 1 It is an application environment diagram of the method of permission addition and permission addition request in an embodiment. Such as figure 1 As shown, the application environment includes a terminal 110, a rights management server 120, and an enterprise back-end server 130, which communicate through a network.
[0048] The terminal 110 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, etc., but it is not limited thereto. The terminal 110 can send data to the authority management server 120 via the network, such as user information, or data sent by the authority management server 120, and the authority management server 120 can respond to the enterprise group authority authentication request sent by the terminal 110 and join the enterprise group Request etc. The authority management server 120 performs authentication verification of the user authority, and generates an authority addition request corresponding to the user whose a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap