Enterprise personnel authentication method, device and system
An authentication method and enterprise technology, applied in the computer field, can solve problems such as cumbersome authentication process and limited credibility of authentication results, and achieve the effect of authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0074] In one embodiment, the logins to the enterprise information platform and the personal information platform are independent of each other. There are also various ways to log in to the enterprise information platform, and accordingly, different login methods correspond to different types of login information. In one embodiment, the login method may be an account and password login, and accordingly, the above-mentioned enterprise login information may include an enterprise account and a password. In another embodiment, the login method may be login with a mobile phone number, and accordingly, the above-mentioned enterprise login information may include a mobile phone number and a dynamic verification code. In this implementation manner, the verification of the enterprise login information can be implemented by using an existing verification method, which will not be repeated here.
[0075] In another embodiment, the login to the enterprise information platform may depend ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


