An authentication method, device and system
A technology for authentication and authentication information, applied in the field of data processing, which can solve the problems of cumbersome operations and occupying extra space on the server
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] In order to more clearly describe the implementation of the authentication method, device and system of the present application, the applicable system structure of the present application will be described first. For example, the authentication method, device and system of this application can be applied to figure 1 shown in the software system, where,
[0029] The client 110 directly faces the user and provides a platform for the user to perform various business operations; when the user performs operations, the client 110 and the server 120 perform data interaction to realize various business operations of the user.
[0030] Hereinafter, implementations of the authentication method, device and system of the present application will be described in detail in conjunction with the accompanying drawings.
[0031] figure 2 It is a schematic flow chart of the first embodiment of the authentication method of this application, as shown in figure 2 As shown, the method in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 