A method for mobile terminal identity authentication
A mobile terminal, identity authentication technology, applied in the direction of user identity/authority verification, security devices, electrical components, etc., can solve the problems of attack, tampering and forgery, single method, etc., to ensure security, improve speed and efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] The present invention will be further described below in conjunction with the accompanying drawings.
[0040] A mobile terminal identity authentication method provided by the present invention is applied to a mobile terminal and a server. The schematic diagram of the internal structure of the embodiment of the mobile terminal and the server is as follows figure 1 As shown, the flow chart of the mobile terminal identity authentication method is as follows figure 2 shown by figure 1 with figure 2 It can be seen that the mobile terminal includes a feature recognition module and a feature detection communication module, and the server includes a feature verification module and a database. The method for mobile terminal identity authentication includes the following steps:
[0041] Step S1, judging whether the feature recognition module and the feature detection communication module are both activated, if yes, execute step S2; if not, exit the identity authentication pro...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 