Authentication method and device
An authentication method and an authenticated technology, applied in the field of authentication methods and devices, can solve the problems of inability to realize user authentication, inability to effectively control user access, etc., and achieve the effect of ensuring security and improving reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Example Embodiment
[0023] The terminology used in this application is only for the purpose of describing specific embodiments, rather than limiting this application. The singular forms of "a", "said" and "the" used in this application and claims are also intended to include plural forms, unless the context clearly indicates other meanings. It should also be understood that the term "and / or" as used herein refers to any or all possible combinations of one or more associated listed items.
[0024] It should be understood that, although the terms first, second, third, etc. may be used in this application to describe various information, the information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other. For example, without departing from the scope of this application, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information. Depending
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap