Verification method, device and system
A verification method and identity verification technology, applied in security devices, transmission systems, digital transmission systems, etc., can solve problems such as information leakage and property loss, and achieve the effect of protection and safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0040] Please refer to figure 1 , which shows a method flowchart of a verification method provided by an embodiment of the present invention, the verification method includes:
[0041] Step 101, acquire a user ID and a first geographic location, where the first geographic location is the geographic location of the terminal during this verification process.
[0042] Step 102: Send a verification request to the verification server, the verification request carries the user ID and the first geographic location, so that the verification server can query whether there is a second geographic location bound to the user ID; if there is a second geographic location bound to the user ID; If the first geographic location matches the second geographic loca...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com