Decryption method and device
A key and key storage technology, applied in the field of information processing, can solve the problems of inability to decrypt the device, poor security, and complicated operation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0069] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0070] refer to figure 1 , showing the step flow of a decryption method embodiment of the present invention Figure 1, the method is applied to the first terminal, the first terminal performs data interaction with the second terminal, the first terminal has a key database, the second terminal has a face recognition data database, and the face recognition The data database includes one or more sets of face recognition data, and each set of face recognition data has an associated key.
[0071] In the embodiment of the present invention, the second terminal needs to collect face recognition data, so it has a camera, while the first terminal does not need to collect face recognition data, so it has a camera or does not have a camera....
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com