Identity authentication method and device, computer equipment and storage medium
An identity authentication and identity verification technology, applied in the field of network security, can solve the problems of low identity authentication security, low complexity of static passwords, and easy leakage of static passwords, so as to avoid leakage and improve security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0078] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0079] First of all, before specifically introducing the technical solution of the embodiment of the present application, the technical background or technological evolution context of the embodiment of the present application is firstly introduced. Usually, in the field of network security technology, the current technical background is: when a user logs in to the network, the authentication password used to uniquely authenticate the current user's identity is obtained in any form, resulting in the impersonation of the user's identity, which in turn leads to network safe ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


