User authentication method and device
A user authentication and user technology, applied in the field of network security, can solve the problems of illegal acquisition of dynamic passwords, error-prone, etc., achieve good compatibility, and avoid the risk of authentication failure.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments shown in the accompanying drawings. These embodiments are given only to enable those skilled in the art to better understand and implement the present invention, but not to limit the scope of the present invention in any way.
[0022] first reference figure 1 , which shows a block diagram of the system 100 according to an embodiment of the present invention. As shown, the exemplary system 100 includes: an authentication server 101 , a first device 102 associated with a user, and a second device 102 associated with the user. The authentication server 101 is a server for performing authentication of a user's identity, and is owned and maintained by, for example, a provider of an authentication service. The first device 102 and the second device 103 can be any currently known or future developed user equipment, including but not limited to personal co...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com