Authentication method and device
An authentication and unique technology, applied in computer security devices, instruments, digital data authentication, etc., can solve the problems of being easily counterfeited, consumers unable to debate the authenticity, disturbing the normal order of the market, etc., to prevent counterfeiting, protect interests, The effect of protecting the rights and interests of consumers
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0038] It should be noted that the embodiment of the present invention is applicable to authenticate all embedded devices that require software support, including but not limited to any one or more of the following devices: mobile phones, MP3 players, MP4 Players, game consoles, learning machines, electronic dictionaries.
[0039] See figure 1 , is a schematic structural diagram of the first embodiment of the authentication device of the present invention; the aut...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 