Device authentication method and system
A technology for device authentication and authentication information, applied in the field of authentication, can solve problems affecting data security, password leakage, and inconvenient operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them.
[0023] Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0024] refer to figure 1 As shown, it is a schematic diagram of an application environment for implementing the device authentication method and system of the present invention.
[0025] The application environment of the device authentication method and system of the present invention includes: a terminal 1 and a plurality of smart glasses 2 communicating with the terminal 1 through wireless communication technology.
[0026] In this e...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap