Address book-based authentication method, terminal device, server and storage medium
An address book and authentication technology, applied in the field of communication, can solve the problems of inability to pre-judg the risk of friend requests and potential security risks, and achieve the effect of reducing network fraud and improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] In order to make the objectives, technical solutions and advantages of the embodiments of the present invention clearer, the various embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, those of ordinary skill in the art can appreciate that, in the various embodiments of the present invention, many technical details are set forth in order for the reader to better understand the present application. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solutions claimed in the present application can be realized.
[0018] The first embodiment of the present invention relates to an authentication method based on an address book, which is applied to a terminal device. By obtaining the characteristic attribute information of each contact in the user's address book, when it is detected that the third-party user requests to ad...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


