Method and system for identity authentication by Bluetooth
An identity authentication and Bluetooth technology, applied in the field of network security, can solve problems such as inability to authenticate mobile devices, achieve the effect of improving user experience and avoiding potential safety hazards
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0026] When the existing bluetooth device is in use, the two devices to communicate must both turn on the bluetooth and keep the bluetooth module in a standby state at any time, otherwise there will be a problem that the other party's device cannot be found when connecting. Since the status of the Bluetooth module is broadcast wirelessly, all devices within the effective receiving range can search for the device and try to connect to it, which makes the Bluetooth shield in danger of being sto...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap