Credit verifying method and device
A verification method and a verification device technology are applied in the field of information security to achieve the effect of protecting security and saving user operations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.
[0036] figure 1 It is a schematic structural diagram of an implementation environment shown according to an exemplary embodiment. Such as figure 1 As shown, the implementation environment may include: a terminal device 110 and a server 120 .
[0037] The terminal device 110 may be a terminal device such as a personal computer, a smart phone, or a tablet computer. figure 1 In the illustration, the terminal device 110 is a personal computer.
[0038] Server 120 may be a computer system capable of providing certain services to other machines in a network. For example, it could be any website or other service provider's computer system.
[0039]Wherein, the co...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 