An identity authentication method and device, electronic equipment, and storage medium
A technology for identity authentication and authentication information, applied in the field of security authentication, can solve problems such as no solution provided, identity authentication security defects, etc., to achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, but not all of them. Based on the embodiments in the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.
[0058] According to an aspect of the embodiments of the present application, an identity authentication method is provided. Optionally, in this embodiment, the above identity authentication method can be applied to a hardware environment composed of a terminal and a server. The server is connected to the terminal through the network an...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


