Identity verification method and device based on mobile terminal
A mobile terminal and identity verification technology, applied in the field of information security, can solve the problems of users waiting for a long time, danger, and low verification accuracy, and achieve the effects of simplifying verification operations, improving accuracy, and strengthening security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.
[0058] The mainstream of existing user information security technology is based on improving the security of verification credentials, and proposes multiple verification methods, such as certificate verification and mailbox verification. However, the flaws of these verification credentials are very fatal. For example, the certificate needs to be installed and is limited to the computer currently in use, and it is also easily affected by the operating system environment; and the email verification also has the risk of the email account being stolen.
[0059] With the complexity of user application scenarios, OTP products have gradually won the favor of users and have been widely used. Such as "Pay Baby Or...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com