A method for securely logging in multiple devices
A secure login and multi-device technology, applied in the field of information security, can solve problems such as equipment loss and user loss, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments, wherein the schematic embodiments and descriptions are only used to explain the present invention, but are not intended to limit the present invention.
[0034] See attached figure 1 , which shows the multi-device connection structure of the present invention, the multiple devices used by the user can be connected to the remote server through the Internet at the same time, and the user can log in to the server through any one of the devices. Based on this structure, the method of the present invention will be described in detail below.
[0035] The concrete steps of the inventive method are as follows:
[0036] (1) The user uses a device A to connect to the remote server, and enters his account to request login to the server. The server obtains the information of the currently logged-in device of the account from the database. Suppose there ar...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


