An environment-adaptive identity authentication method and terminal
An identity authentication and adaptive technology, applied in the field of information security, can solve problems such as noise interference, reduce authentication accuracy and reliability, and achieve the effect of improving robustness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] Hereinafter, the principle and gist of the present invention will be described with reference to the embodiments. It should be understood that the given examples are only for those skilled in the art to better understand the present invention and further practice the present invention, rather than to limit the scope of the present invention. For example, features illustrated or described as part of one embodiment can be used with another embodiment to yield yet a further embodiment. In the interest of clarity, not all features of an actual implementation are described in this specification.
[0023] figure 1 A schematic flowchart of an environment adaptive identity authentication method according to an embodiment of the present invention is shown. Such as figure 1 As shown, the environment adaptive identity authentication method may include the following steps:
[0024] Step 101: collecting multiple environmental parameters through sensors;
[0025] Step 102: Deter...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

