Method and apparatus for authentication
An identity verification and verification device technology, applied in the field of information processing, can solve problems such as increasing the risk of personal information leakage, and achieve the effect of preventing attacks and facilitating identity verification.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present disclosure. Obviously, the described embodiments are part of the embodiments of the present disclosure, not all of them. In case of conflict, the embodiments in the present application and the features in the embodiments can be combined with each other arbitrarily.
[0038] figure 1 is an illustration of a scenario architecture for identity verification according to an embodiment of the present disclosure. Such as figure 1 As shown, the scenario architecture for identity verification includes a user to be verified, a verification device 10 for verifying the user's identity, a specific management system 20 for managing the user's real information, and an independent application platform 30 for performing identity verification. The independent application platform 30 may need t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


