Method and device for logging in through user equipment and verifying user's identity
A user equipment and user technology, applied in the field of user login and user identity verification, to achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The principles of the invention will be described below with reference to several example embodiments shown in the accompanying drawings. It should be understood that these embodiments are described only to enable those skilled in the art to better understand and implement the present invention, but not to limit the scope of the present invention in any way.
[0031] figure 1 is a flow chart of a method 100 for logging in through a user equipment according to an embodiment of the present invention, which includes steps S101 to S104.
[0032] In step S101, the user's login account and password are input. Usually, the user's login account and password are input through the client software on the user equipment. A user's device as described herein may be any user device into which a smart card is inserted, such as a cell phone, tablet, laptop, personal digital assistant, game console, and the like.
[0033] Next, the method proceeds to step S102, using the private key i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 