Authentication method and device and information generating method and device used for authentication
An authentication method and authentication device technology, applied in the field of information security, can solve problems such as single interface and low authentication reliability, and achieve the effects of increasing difficulty, realizing diversification, and improving authentication reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0043] The solution of the present application may be used for authentication, for example, for authenticating the second user when the second user (that is, the user to be authenticated) performs a specific operation. The specific operation may be: screen unlocking operation, login operation, personal information modification operation, payment opera...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


