Authentication method, server, and terminal
An authentication method and server technology, applied in the field of servers, terminals, and authentication methods, can solve problems such as low security, hidden dangers, and inability to confirm the real identity of users, and achieve the effect of improving security and eliminating hidden dangers.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0042] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.
[0043] figure 1 This is a flowchart of the first embodiment of an authentication method provided by an embodiment of the present invention. In the embodiment of the present invention, the authentication method is applied to a server, and the server can be used to provide an identity authentication function. The user uses a terminal to access the server through the network, and completes operations such as transfer and payment through inte...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2023 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap