Security authentication method and system based on distribution automation wireless maintenance
A technology of distribution automation and safety certification, applied in the field of intelligent distribution network, can solve problems such as poor wireless connection security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] Such as figure 1 As shown, in one embodiment, a method for security authentication based on distribution automation wireless maintenance includes the following steps:
[0032] Step S100, receiving a login request uploaded by a mobile terminal, where the login request carries identity authentication information.
[0033] Identity authentication information includes login account number and password, QR code business card, etc. The mobile terminal interacts with the server for login requests through a browser or software. The mobile terminal can be a smartphone, tablet or computer. Specifically, the user may input a login account and a login password on a login interface of the computer.
[0034] Step S200, perform identity authentication according to the login request.
[0035] Identity authentication refers to the confirmation of user identity through certain means. There are many methods of identity authentication, which can be basically divided into: identity authen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


