Identity authentication method and system
A technology of identity authentication and path, applied in the network field, can solve the problem of low security and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] like figure 1 As shown, an identity authentication method provided by the present invention includes the following steps:
[0039] Step S10, using the first path to perform first identity authentication on the user.
[0040] Step S20, receiving an operation request initiated by the user after passing the first identity authentication.
[0041] Step S30, using a second path different from the first path to perform second identity authentication on the user.
[0042] Step S40, performing an operation corresponding to the operation request according to the authentication result of the second identity authentication.
[0043] The present invention authenticates the user's identity through two different paths, and since a malicious third party can usually only intercept user authentication information on one path, the present invention can effectively improve the security of operation.
[0044] The above-mentioned operation request may be a sensitive operation request tha...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 