A terminal security management and control method for rail transit cloud
A rail transit and terminal security technology, applied in the direction of security communication devices, digital transmission systems, electrical components, etc., can solve problems such as dangerous safety hazards, achieve the effect of solving the problem of malicious snooping and illegal access of terminals
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment
[0053] Embodiment: The login verification process specifically includes the following steps:
[0054] S1: The terminal APP sends a login request message to the security gateway. The request message information includes the node, user, password, request data (such as the screen to be viewed, the request to be sent, etc.), the code of the information area, etc. The security gateway will be legal The message is forwarded to the rail transit cloud, and the rail transit cloud allocates terminal security management and control services to be responsible for verification;
[0055] S2: The security gateway forwards the maintenance request and related login data (authority, serial number, information area code, IP, etc.) to the corresponding rail transit cloud, and the rail transit cloud security management and control service determines whether to allow the terminal APP to log in; The terminal security management and control service sequentially verifies whether the security code, use...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com