Method, apparatus, and computer-readable recording medium for authenticating a user
A technology for authenticating users and storage devices, applied in computer components, calculations, digital data authentication, etc., can solve problems such as authentication failure of the same registered user, and achieve the effect of overcoming security loopholes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The present disclosure has been described in detail with reference to the accompanying drawings relating to specific embodiments in which the present disclosure can be implemented. The embodiments are described in detail to enable those of ordinary skill in the art to practice the present disclosure. It should be understood that the various embodiments of the present disclosure differ from each other, but are not necessarily mutually exclusive. For example, specific shapes, structures and characteristics described herein with respect to an embodiment may be implemented in another embodiment without departing from the spirit and scope of the present disclosure. It should be noted that the location and arrangement of each element within each disclosed embodiment may be modified without departing from the spirit and scope of the disclosure. Therefore, the following detailed description should not be construed as limiting the present disclosure. The scope of the present d...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com