Method and system for authentication
An authentication system and authentication equipment technology, applied in the field of security applications, can solve security issues and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] According to the present invention, the security authentication of the intelligent terminal equipment is completed through the main control equipment storing authentication information such as ID, ID key, ID authentication key, and knowledge, which improves the security problem of the intelligent terminal equipment as the authentication equipment.
[0032] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.
[0033] figure 1 The application scenario diagram provided for the embodiment of the present invention. Such as figure 1 As shown, the main control device is an electronic lock or a car lock; the authentication device is a third-party application program (Application, APP) on a smart phone or a tablet.
[0034] If the known information is pre-set on the smart phone, the use of the first external input information and the second external input information is controll...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 