Authentication method
An authentication method and authenticator technology, applied in the usage of multiple keys/algorithms, user identity/authority verification, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0049] The overall process of the present invention is as figure 2 As shown, the specific steps are as follows:
[0050] Step 201. After receiving the access request sent by the terminal, the authentication server judges whether the password corresponding to the requesting user is valid, and if yes, executes step 202; otherwise, executes step 203;
[0051]Step 202, sending the authentication result information to the terminal, and then directly ending the process;
[0052] Step 203, the authentication server obtains the final valid password of the user, and sends the final valid password to the user;
[0053] Step 204, the authentication server instructs the terminal to initiate authentication to the authentication server with the final valid password, and the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 