Abstract:
A user identity verification method is disclosed. The method includes receiving an identity verification request sent by a user through a client terminal; determining a user communication number according to the identity verification request and generating a corresponding temporary communication number for the user communication number; recording the user communication number and the temporary communication number as first data; returning the temporary communication number to the client terminal; receiving a call request initiated by the user to the temporary communication number; determining a respective user communication number and a respective temporary communication number corresponding to the call request as second data; verifying whether the first data matches with the second data; and returning a verification result to the client terminal. The method can improve security and reliability of identity verification, reduce a user's waiting time, and enhance user experience.
Abstract:
A method, an apparatus, a server and a terminal of accessing a network are disclosed. The method includes: receiving a first base station identifier and a first terminal identifier of a terminal from the terminal, the first base station identifier being a base station identifier of a first Bluetooth base station acquired by the terminal after establishing a connection with the first Bluetooth base station; obtaining a first access point device associated with the first Bluetooth base station based on the first base station identifier; and sending an access instruction to the first access point device to cause the first access point device to allow the terminal to access a wireless network upon verifying that the terminal has been registered based on the first terminal identifier. Using the embodiments of the present disclosure, a terminal can automatically access a wireless network without the need of a terminal user to perform cumbersome input operations manually, thereby improving the speed of accessing a network.