An authentication method, device and system
A technology for authentication and authentication information, which is applied in the fields of authentication methods, devices and systems, and can solve problems such as no authentication methods.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are the Claim some of the examples, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0057] With the development of network technology, resource sharing on the network is becoming more and more common, and resource providers can share resources stored in servers with other users through the network. Especially with the emergence of the fifth generation of Hypertext Markup Language (English: Hyper Text Markup Language 5, abbreviation: HTML5), it becomes possible to sh...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


