Identification identifying method
A technology for identity authentication and user identification, applied in the field of identity authentication, can solve problems such as huge construction costs, use costs, and complex structures
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.
[0018] The key point of the present invention is that in the identification process, the user uses different channels to transmit the account information and key information to the identification server to achieve the purpose of ensuring information security. Both the first channel and the second channel can be one of the public Internet, fixed-line voice, dedicated man-machine interface, mobile network voice, and mobile network SMS. It can be used as two transmission channels of the present invention.
[0019] Please refer to FIG. 1 . FIG. 1 is a schematic flowchart of an embodiment of an identity authentication method of the present invention. In this embodiment, the user transmits account information and key information respectively by using the pub...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com