A security access method for application system
An application system and security access technology, applied in the security access field of application systems, can solve the problems of malicious attacks by hackers, leaks, easy to be attacked, etc., and achieve the effect of avoiding malicious attacks, preventing illegal interception, and avoiding data leakage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer and clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0026] Such as Figure 1 to Figure 2 As shown, the present invention provides a security access method for an application system, the method provides a gateway server LdNetServer.exe, a configuration server LdDataServer.exe and a plurality of security terminals, the security access method comprises the following steps:
[0027] S01: Set the configuration data of the configuration server, and verify the user identity of the security terminal through the configuration data. If the user identity verification is passed, step S02 is executed. If the user ide...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com