Identity authentication method and device
A technology for identity authentication and identity authentication results, applied in the field of identity authentication methods and devices, can solve the problems of unreasonable identity authentication methods and poor user experience, and achieve the effect of flexible identity authentication methods and good user experience.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] In order to solve the problems of unreasonable identity authentication methods and poor user experience in the access control system in the prior art, embodiments of the present application provide an identity authentication method and device.
[0049] The preferred embodiments of this application will be described below in conjunction with the accompanying drawings of the specification. It should be understood that the preferred embodiments described here are only used to illustrate and explain this application, and are not used to limit this application, and in the case of no conflict, this application The embodiments in and the features in the embodiments can be combined with each other.
[0050] See figure 1 , figure 1 Shows a schematic diagram of the application scenario of the identity authentication method provided by the embodiments of the present application, including a server, an access control terminal, and an access control system. The access control system inclu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


