User biometric authentication method and system
An authentication method and biometric technology, which is applied in the field of user biometric authentication, can solve problems such as a single biometric authentication method, and achieve the effect of improving security and preventing recording playback
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] According to the embodiment of the present invention, a method embodiment that can be used to implement the embodiment of the device of the present application can be provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a program such as a set of computer-executable instructions computer system, and although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0057] According to an embodiment of the present invention, a method for authenticating a user's biometric feature is provided. The following is a specific introduction to the method for authenticating a user's biometric feature provided by the embodiment of the present invention:
[0058] figure 1 is a flow chart of a user biometric authentication method according to an embodiment of the present invention, such as figure 1 As shown, the met...
Embodiment 2
[0105] According to the embodiment of the present invention, there is also provided a user biometric authentication system for implementing the above user biometric authentication method, the authentication system is mainly used to implement the authentication method provided in the above content of the embodiment of the present invention, the following describes this The user biometric authentication system provided by the embodiment of the invention is described in detail:
[0106] image 3 is a schematic diagram of an authentication system according to an embodiment of the present invention, such as image 3 As shown, the authentication system mainly includes a client 10 and a server 20, wherein the client 10 and the server 20 can communicate through a mobile network, the Internet or an enterprise network. Specifically, such as Figure 4 As shown, the client 10 mainly includes a first sending unit 11, a first receiving unit 12, an acquisition unit 13, a first judging unit...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com