Operation right authentication method and device
A technology of operation authority and verification method, applied in the network field, can solve problems such as poor security, cumbersome login process, and low login efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0124] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be described in further detail below in conjunction with the implementation manners and accompanying drawings. Here, the exemplary embodiments of the present disclosure and their descriptions are used to explain the present disclosure, but not to limit the present disclosure.
[0125] Embodiments of the present disclosure provide a method and device for verifying operation authority, and the present disclosure will be described in detail below with reference to the accompanying drawings.
[0126] In one embodiment, figure 1 is an exemplary flow chart of the operation authority verification method, see figure 1 , the method includes:
[0127] In step 101, the feature code generated by the second terminal is obtained, the feature code carries at least the second terminal identifier, and the method of this embodiment is used in the first termina...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com