Method and device for user-defined verification mode
A verification method and user technology, applied in the computer field, can solve problems such as information leakage and weak verification methods
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0134] According to an implementation manner, the event information includes at least one of the following: user information, device information, service type, and service serial number.
[0135] In one embodiment, the above-mentioned verification unit 103 is configured to sequentially obtain each verification information provided by the user for each verification method in the at least one verification method, and send each verification information to the verification verification center, so that the verification verification center User identity is verified.
[0136] According to yet another embodiment, a device for security verification is provided at the server. Figure 11 A schematic block diagram of a security verification device according to an embodiment is shown. It needs to be understood that, Figure 11 The verification device 110 is located on the server side and is used to assist the client to perform security verification. Such as Figure 11 As shown, the dev...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


