Method, device and system for authentication
A technology of authentication and authentication information, which is applied in the Internet field, can solve problems such as increasing service response delays, and achieve the effects of ensuring uniqueness, reducing the number of authentication operations, and avoiding plaintext transmission
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055] In order to make the objectives, technical solutions, and advantages of the present application clearer, the following will further describe the embodiments of the present application in detail with reference to the accompanying drawings.
[0056] The system architecture and business scenarios described in the embodiments of this application are intended to more clearly illustrate the technical solutions of the embodiments of this application, and do not constitute a limitation on the technical solutions provided in the embodiments of this application. Those of ordinary skill in the art will know that with the system architecture The evolution of and the emergence of new business scenarios, the technical solutions provided in the embodiments of this application are equally applicable to similar technical problems.
[0057] Please refer to figure 1 , Which shows a schematic diagram of an implementation environment provided by an embodiment of the present application. The impl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


