Identity verification method and device
An identity verification and security level technology, applied in the field of communications, can solve the problems of reducing operational efficiency, financial risks in financial operations, inflexible identity verification methods, etc. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] figure 1 It is a flow chart of the identity verification method provided by the embodiment of the present invention. Embodiments of the present invention aim at the inflexibility of existing identity verification methods, and select different identity verification methods according to the different environments where the mobile terminal is located, so as to implement identity verification for the operator. The specific steps of the identity verification method are as follows:
[0019] Step S101, acquiring the environment information of the environment where the mobile terminal is located;
[0020] Acquire the environmental information of the environment where the mobile terminal is located. The environmental information may specifically be the geographic location information of the mobile terminal, or the geographic location information and network environment information of the mobile terminal. In the embodiment of the present invention, the geographic location informa...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

