Login token generation and authentication method, device thereof, and storage medium
A verification method and token technology, applied in the security field, can solve problems such as hidden dangers of user security, and achieve the effect of preventing harm and improving the security of information interaction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0039] like figure 1 Shown is a schematic diagram of a preferred embodiment of the electronic device 1 of the present invention.
[0040] In this embodiment, the electronic device 1 refers to a server system, and the electronic device 1 may be a computing device such as a rack server, a blade server, a tower server, or a cabinet server, and the electronic device 1 may be an independent server , or a server cluster composed of multiple servers.
[0041] The electronic device 1 includes but not limited to: a memory 11 , a processor 12 , a display 13 and a network interface 14 . The electronic device 1 is connected to the network through the network interface 14 to obtain raw data. Wherein, the network may be an intranet (Intranet), Internet (Internet), Global System of Mobile Communication (Global System of Mobilecom...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com