Identity authentication method, device and system
A technology of identity authentication and corresponding relationship, which is applied in the field of information security authentication, can solve the problems that cannot be popularized, cannot cover all users, and cannot fundamentally solve the problem of account theft
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0115] The address book system and method proposed by the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Advantages and features of the present invention will be apparent from the following description and claims.
[0116] figure 1 It is a flowchart of an identity authentication method according to an embodiment of the present invention. Such as figure 1 As shown, the identity authentication method includes the following steps:
[0117] Step S1, the client sends a request for account authentication to the server;
[0118] Step S2, the server judges whether the client has a large file;
[0119] If there is a large file, the server side judges whether the account has been bound with the large file (such as figure 1 In step S3), if it has been bound, it will directly perform identity authentication (such as figure 1 In step S4), if it is not bound, then the account will be bound with the la...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com