Authentication method of specified condition, authentication software and authentication device
An authentication method and authentication software technology, applied in the field of authentication methods, can solve problems such as user inconvenience and high labor costs, and achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] Please refer to figure 1 and cooperate image 3 As shown, in this embodiment, the authentication method with specified conditions is suitable for performing specified conditions authentication on the user through the device 100, including the following steps: In step S110, start the first capture unit 110 of the device 100, and capture The user's information to be authenticated. In step S120, start the first capture unit 110 or the second capture unit 120 of the device 100, and capture a specified condition information (such as the user's certificate or the content disclosed by the certificate). Among them, the first capture unit 110 or the second capture unit 120 may be required to simultaneously capture the user's information to be authenticated and specified condition information, which includes the following two situations at the same time as described here: (1) using the first capture A pair of the fetching unit 110 or the second fetching unit 120 fetches the inf...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


