Authentication method and device of access permission
A technology for access rights and authentication requests, applied in user identity/authority verification, secure communication devices, and key distribution, which can solve problems such as leakage of online account passwords, interception by criminals, and low security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0088] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0089] see figure 1 , shows a structural block diagram of an embodiment of an authentication system for access rights in the present invention, the system includes a terminal 01 and an authentication server 02, the terminal 01 and the authentication server 02 are connected in communication, and the terminal 01 and the authentication server 02 can be Interaction is performed through the communication connection, and the terminal 01 includes devices such as mobile phones, tablet computers, and desktop computers.
[0090] refer to figure 2 , shows a flow chart of the steps of an embodiment of an access right authentication method in the present invention, the method is applied to figure 1 In the system shown, specifically, the fol...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com