Authentication method and device
An authentication method and certificate technology, applied in the Internet field, can solve problems such as easy loss or leakage of registration codes, loss of enterprises and legal users, etc., and achieve the effect of protecting interests
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] According to an embodiment of the present invention, a method embodiment of an authentication method is provided. It should be noted that the steps shown in the flowcharts of the drawings can be executed in a computer system such as a set of computer-executable instructions, and, although A logical order is shown in the flowcharts, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0043] figure 2 is a flowchart of an optional authentication method according to an embodiment of the present invention, such as figure 2 As shown, the method includes the following steps:
[0044] Step S202, receiving the server information sent by the target server when requesting to install the server;
[0045] Step S204, verifying whether the received server information matches the preconfigured server information, so as to determine whether the target server has the right to install the server;
[0046] Step S20...
Embodiment 2
[0097] According to an embodiment of the present invention, a device embodiment of an authentication device is provided.
[0098] Figure 5 is a schematic diagram of an optional authentication device according to an embodiment of the present invention, such as Figure 5 As shown, the device includes: a first receiving unit 502, configured to receive the server information sent when the target server requests to install the server; a first verification unit 504, configured to verify whether the received server information matches the pre-configured server information , to determine whether the target server has the installation right to the server; the first determining unit 506 is configured to determine that the target server has the installation right to the server in the case of matching.
[0099] That is, if the user wants to install a server (also called server software) on the target server, the target server will send its own server information to the authentication se...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


