Identity authentication method, device and system
An identity authentication device and identity authentication technology, applied in the field of identity authentication methods, devices and systems, can solve problems such as inconvenient use, cumbersome operation of entering account passwords on large tablets, and achieve the effects of solving cumbersome operations, improving authentication efficiency, and simplifying operations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] According to an embodiment of the present invention, a method embodiment of an identity authentication method is provided. It should be noted that the steps shown in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases steps shown or described may be performed in an order different from that herein.
[0029] figure 1 is an identity authentication method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0030] Step S102, in the case of establishing a connection with the mobile terminal, send an authentication link to the mobile terminal.
[0031] Wherein, establishing a connection with the mobile terminal includes: connecting the mobile terminal to a hotspot created by itself. Taking a large tablet as an example, the large tablet can create a hotspo...
Embodiment 2
[0050] According to an embodiment of the present invention, an embodiment of an identity authentication device is provided, image 3 is an identity authentication device according to an embodiment of the present invention, such as image 3 As shown, the device includes:
[0051] The communication module 30 is configured to send an authentication link to the mobile terminal when a connection is established with the mobile terminal; the communication module 30 is also configured to receive the first identity entered by the mobile terminal based on the authentication link information; an authentication module 32, configured to authenticate the first identity information, and open the authority corresponding to the first identity information according to the authentication result.
[0052] The authentication module 32 is used to perform the following steps to authenticate the first identity information: encrypt the first identity information; obtain the identity information of th...
Embodiment 3
[0060] According to an embodiment of the present invention, an embodiment of an identity authentication system is provided, Figure 5 is an identity authentication system according to an embodiment of the present invention, such as Figure 5 As shown, the system includes:
[0061] The cloud 50 is used to pre-store the identity information of authorized users;
[0062] The communication module 52 is configured to send an authentication link to the mobile terminal when establishing a connection with the mobile terminal; receive first identity information input by the mobile terminal based on the authentication link;
[0063] The authentication encryption module 54 is connected with the cloud and the communication module, and is used to encrypt the first identity information; obtain the identity information of the pre-stored authorized user from the cloud; matching the pre-stored identity information of the authorized user to obtain the authentication result; enabling the autho...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com