Authentication method, device and system
An identity verification method and identity verification technology, applied in the field of devices, systems, and identity verification methods, can solve problems such as insufficient security, poor anti-cracking ability, and difficult recognition by users, so as to enhance security and prevent machine cracking Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0034] See figure 2 , is a flow chart of the identity verification method provided in the first embodiment of the present invention; this embodiment is the identity verification method performed by the server, including the following steps:
[0035] Step S11, the server receives the identity verification request sent by the first terminal.
[0036] When the user uses the first terminal to perform sensitive operations that require identity verification, such as initiating a transaction, or the user logs in to an application too many times within a certain period of time, or the user logs in to an application in a different place, or the user enters a wrong password for an application too many times, etc. When the situation occurs, the first terminal can send an identity verification request to the server.
[0037] Step S12, generating verification code information to be verified and preset verification confirmation information according to the identity verification request, a...
no. 2 example
[0052] See image 3 , is a flow chart of an identity verification method provided in the second embodiment of the present invention; this embodiment is an identity verification method performed by a server, and the server in this embodiment may include a WEB server and a verification server. It can be understood that, in this In other specific embodiments of the invention, the WEB server and the verification server can also be integrated into one server. The verification method of this embodiment includes the following steps:
[0053] Step S21, the WEB server receives the identity verification request sent by the first terminal, and the identity verification request carries the account number of the first terminal.
[0054] Step S22, the WEB server obtains the verification code information to be verified and the preset verification confirmation information corresponding to the identity verification request from the verification server according to the identity verification re...
no. 3 example
[0065] See Figure 4 , is a flow chart of an identity verification method provided in the third embodiment of the present invention; this embodiment is an identity verification method executed by mutual interaction between the first terminal, the second terminal and the server; the method may include the following steps:
[0066] Step S31, the first terminal sends an identity verification request to the server.
[0067] Step S32, the server generates verification code information to be verified and preset verification confirmation information according to the identity verification request, sends the verification code information to be verified to the first terminal, and according to the identity The verification request sends a verification confirmation information collection request to the second terminal bound to the account of the first terminal.
[0068] Step S33, the first terminal presents the verification code information to be verified to the user.
[0069]Step S34: ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
