Identity authentication method and device
A technology for identity authentication and device identity, which is applied in the fields of network security and information security, and can solve the problems of stable operation of production control information system, delay, interruption sensitivity, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.
[0030] combine figure 1 and figure 2 As shown, one aspect of the present invention provides an identity authentication method, which is applied to the first device, and the method includes:
[0031] Step 101, when the intermediate device disconnects the communication connection with the second device, establish a communication connection w...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


