Information authentication method and device taking identity information authentication as carrier
A technology of identity information authentication and carrier, which is applied in the computer field, can solve problems such as restrictions and cumbersome information authentication, and achieve the effect of improving authentication efficiency and avoiding too cumbersome
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] According to Embodiment 1 of the present invention, an information authentication method using identity information authentication as a carrier is provided, such as figure 1 As shown, it is a schematic flowchart of an information authentication method based on identity information authentication provided by Embodiment 1 of the present invention. The method at least includes the following steps:
[0026] S101. Receive an information authentication request from the current user, and extract corresponding information authentication keyword information from the information authentication request;
[0027] S102, matching the corresponding official platform to be accessed according to the information authentication keyword information, and accessing the official platform;
[0028] S103. Receive the information to be authenticated input by the current user, and retrieve the identity information of the current user associated with the information to be authenticated from the o...
Embodiment 2
[0040] According to Embodiment 2 of the present invention, an information authentication device with identity information authentication as the carrier is also provided, such as Figure 4 As shown, it is a schematic structural diagram of an information authentication device using identity information authentication as a carrier provided by Embodiment 2 of the present invention.
[0041] An information authentication device based on identity information authentication provided by Embodiment 2 of the present invention includes a request receiving module 401, an extraction module 402, a matching access module 403, an information receiving module 404, a calling module 405, and an information comparison module 406 and processing module 407 .
[0042] Specifically, the request receiving module 401 receives the information authentication request of the current user;
[0043] The extraction module 402 extracts corresponding information authentication keyword information from the info...
Embodiment 3
[0055] According to Embodiment 3 of the present invention, an electronic device is also provided, and the electronic device includes: a memory and a processor, and the processor and the memory communicate with each other through a bus; The program instruction executed by the processor, the processor calling the program instruction can execute the following method: receiving the information authentication request of the current user, and extracting the corresponding information authentication keyword information from the information authentication request; according to the information authentication keyword information Match the corresponding official platform to be accessed and access the official platform; receive the information to be authenticated input by the current user, and retrieve the identity information of the current user associated with the information to be authenticated from the official platform; Authentication information, compare whether the current user is a ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


