Safe operation legality verification method and device
A legality verification and safe operation technology, which is applied in the field of safe operation legality verification methods and devices, can solve the problems of not being able to guarantee the legal identity and verification of users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0063] figure 2 Shown is a logical composition block diagram of the security operation legality verification device of this embodiment, as figure 2 As shown, a security operation legality verification device provided by Embodiment 1 of the present invention is used as a first electronic device capable of authenticating the legal identity of a client user in a network environment, and the device includes:
[0064] A communication interface 220, configured to receive a security operation command sent by the client to the first electronic device 210;
[0065] The safety operation module 270 is used to respond to the safety operation command, execute the safety operation and save the result data to the data storage module 240; and generate verification information according to the safety operation order;
[0066] A verification prompt module 260, configured to prompt the user to verify the verification information through the first electronic device 210;
[0067] The main proc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


