Identity authentication method and identity authentication device
A technology for identity authentication and geographic location information, applied in the field of identity authentication methods and devices, can solve problems such as poor user experience, and achieve the effects of easy acquisition and improved efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] An embodiment of the present invention provides an identity authentication method, which is applied to the process of a user logging in to a third-party platform, such as figure 1 As shown, the identity authentication methods include:
[0040] S101. The identity authentication server receives an identity authentication request sent by a third-party platform, and the identity authentication request includes a user's mobile phone number.
[0041] Wherein, the mobile phone number included in the identity authentication request is the mobile phone number entered by the user when logging in on the third-party platform. The identity authentication server is a server set up by the mobile operator and used for identity authentication of the user. The third-party platform is the platform that users need to log in to conduct Internet business. For example, the third-party platform can be WeChat, QQ, Taobao, and game websites.
[0042] S102. According to the mobile phone number,...
Embodiment 2
[0052] The embodiment of the present invention provides an identity authentication method, which is applied to the process of user login to the third-party platform, such as figure 2 As shown, the identity authentication methods include:
[0053] S201. The first identity authentication client receives a user information request sent by an identity authentication server.
[0054] Wherein, the first identity authentication client is a client installed on the user's mobile terminal and used for identity authentication of the user. The identity authentication server is a server set up by the mobile operator and used for identity authentication of the user. The user information request is used to indicate that the user is logging into the third-party platform, and requests the first identity authentication client to report the user information, and the user information is used to indicate the user's communication status within a preset time period.
[0055] S202. If the first id...
Embodiment 3
[0060] The embodiment of the present invention provides an identity authentication method, which is applied to the process of user login to the third-party platform, such as image 3 As shown, the identity authentication methods include:
[0061] S301. The first identity authentication client receives a time parameter pre-allocated by the identity authentication server.
[0062] Wherein, the first identity authentication client is a client installed on the user's mobile terminal and used for identity authentication of the user. The identity authentication server is a server set up by the mobile operator and used for identity authentication of the user.
[0063]The time parameters include: a first preset time t1 and a second preset time t2. t1 and t2 may be time parameters randomly generated by the identity authentication server. For different identity authentication clients, the identity authentication server can assign different t1 and t2. The first identity authenticatio...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com