Identity authentication method and device based on power system, computer equipment and storage medium
An identity authentication and power system technology, applied in the power field, can solve problems such as low security and achieve the effect of high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0068] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0069] The identity authentication method based on the power system provided by this application can be applied to such as figure 1 shown in the application environment. The application environment includes a server 1 and a terminal 2, wherein the terminal 2 is equipped with a camera 21, a display 22, and a voice input device 23. The server 1 communicates with the terminal 2 through the network. Terminal 2 collects identity authentication information through the configured camera, display, and voice input device, and sends the collected identity authentication informatio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


