Terminal safety management and control method for rail transit cloud
A rail transit and terminal security technology, applied in electrical components, transmission systems, etc., can solve problems such as dangerous safety hazards, achieve the effect of solving malicious snooping problems and illegal terminal intervention problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment
[0053] Embodiment: The login verification process specifically includes the following steps:
[0054] S1: The terminal APP sends a login request message to the security gateway. The request message information includes the node, user, password, request data (such as the screen to be read, the request to be sent, etc.), the information area code, etc. The security gateway will be legal The message is forwarded to the rail transit cloud, and the rail transit cloud allocates terminal security management and control services to be responsible for verification;
[0055] S2: The security gateway forwards the maintenance request and related login data (authorization, number, information area code, IP, etc.) to the corresponding rail transit cloud. The security management and control service of the rail transit cloud determines whether to allow the terminal APP to log in; The terminal security management and control service sequentially verifies whether the terminal’s security code, user, ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com