Authentication system and method
An authentication and authentication request technology, which is applied in the field of information security, can solve the problems that the availability of the authentication system cannot be guaranteed, and achieve the effect of improving the quality of authentication services, reducing access delays, and improving availability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0041] Before introducing the embodiments of the present invention, the "authorization" and "authentication" involved in the embodiments of the present invention are first explained.
[0042] Authorization refers to granting certain permissions to users. For example, the service provider grants the user the right to perform a certain operation, the service provider grants the user the access right to a certain resource, and the service provider grants the user the right to perform a certain operation on a certain resource. By granting permissions to users, service providers can help service providers securely control their users' access to their resources. For example, control which users can access resources, and control which resource...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com