An access protection method and system
A technology of access request and data access, applied in the direction of transmission system, electrical components, etc., can solve illegal use, illegal use of dongle software, etc., and achieve the effect of preventing illegal use, safe seamless connection, and strong applicability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] Hereinafter, specific embodiments of the present invention will be described in detail with reference to the accompanying drawings, but it is not a limitation of the present invention.
[0058] The embodiments of the present invention provide an access protection method and system. The access protection method is suitable for secure access of hardware devices and access to the cloud, or access to other applications, web pages, etc., to provide secure login of accounts and access to devices / data. Secure access. Specifically, the embodiment of the present invention narrows the scope of the authorized area so that the user can only access the authorized device or software product within the authorized geographic area. Once you leave the authorized area, you will be restricted from access and cannot be used.
[0059] Specific, such as figure 1 As shown, the embodiment of the present invention provides a principle flowchart of an access protection method, which may include the f...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


