An Identity Authentication System Based on Telecom Operators
A telecom operator, identity authentication technology, applied in the direction of user identity/authority verification, etc., can solve the problems of cumbersome login and lack of strong account protection, and achieve the effect of increasing efficiency and easy application.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Of course, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on The claims in the present invention, except for the embodiments but within the scope of the claims, also belong to the protection scope of the present invention.
[0027] as attached figure 1 As shown, a telecom operator-based identity authentication system is characterized in that it includes:
[0028] The identity authentication request provider is the merchant that requires confirmation of the user's identity. The identity authentication request provider will first input the merchant's identification code, password, and user terminal (that is, the server facing the user, such as a web page, electronic gate, etc.) etc.), the authentication proce...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com