Real person authentication method and device
A real person and certificate technology, applied in the Internet field, can solve the problems of item information leakage, user biometric duplication and theft, etc., to achieve the effect of improving credibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] Multiple embodiments disclosed in this specification will be described below in conjunction with the accompanying drawings.
[0040] figure 1 A schematic diagram of the application scenario of the real person authentication method provided by an embodiment disclosed in this specification. figure 1 Among them, when the server (for example, the server can be the server of the Alipay application) detects that the user has registered the first account (for example, the first account can be Alipay account) to perform an account operation (for example, the account operation can be registering the first account, or using the funds in the first account for consumption), the real person authentication method provided by the multiple embodiments disclosed in this specification can be used, Perform real-person authentication on the first account to check whether the user requesting the account operation on the first account is consistent with the real-person information in the re...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com