Login verification method and device, and login method and device
A technology for authentication and login request, applied in the network field, which can solve the problem of low security of user accounts
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0052] Such as figure 1 As shown, it is a diagram of an application environment implemented by a login verification method in an embodiment, and the application environment includes a terminal 102 and a server 104 . Wherein, the terminal 102 may be a mobile phone, a personal notebook, a tablet computer or a desktop computer, etc.; the terminal 102 and the server 104 communicate through a network.
[0053] In one embodiment, the above figure 1 The schematic diagram of the internal structure of the server 104 in figure 2shown. The server includes a processor connected through a system bus, an in...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com