Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method of specified condition, authentication software and authentication device

An authentication method and authentication software technology, applied in the field of authentication methods, can solve problems such as user inconvenience and high labor costs, and achieve the effect of improving efficiency

Inactive Publication Date: 2019-02-01
ORBIT TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the existing method also brings inconvenience to the user in the authentication steps of the specified conditions, and will generate a large amount of labor costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method of specified condition, authentication software and authentication device
  • Authentication method of specified condition, authentication software and authentication device
  • Authentication method of specified condition, authentication software and authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Please refer to figure 1 and cooperate image 3 As shown, in this embodiment, the authentication method with specified conditions is suitable for performing specified conditions authentication on the user through the device 100, including the following steps: In step S110, start the first capture unit 110 of the device 100, and capture The user's information to be authenticated. In step S120, start the first capture unit 110 or the second capture unit 120 of the device 100, and capture a specified condition information (such as the user's certificate or the content disclosed by the certificate). Among them, the first capture unit 110 or the second capture unit 120 may be required to simultaneously capture the user's information to be authenticated and specified condition information, which includes the following two situations at the same time as described here: (1) using the first capture A pair of the fetching unit 110 or the second fetching unit 120 fetches the inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method of a specified condition for executing the authentication on the specified condition on a user through a device. The authentication method comprises the following steps: starting a first retrieval unit of the device to retrieve to-be-authenticated information of the user; starting the first retrieval unit of the device or a second retrieval unit toretrieve specified condition information; executing analysis judgment software to analyze and judge whether the to-be-authenticated information and the specified condition information are consistent;and if the to-be-authenticated information and the specified condition information are consistent, authenticating that the user reaches the specified condition. Therefore, the tedious step of manuallyconfirming in the prior art is overcome.

Description

technical field [0001] The present invention relates to an authentication method for confirming that a user meets specified conditions through comparison and analysis, and in particular to an authentication method, authentication software, authentication device, and server using a mobile device. Background technique [0002] In recent years, with the advancement of technology, many procedures that require the user to go to the site of the relevant unit in person can be handled through the Internet to save the user's time of moving. Alternatively, many software or application programs carried by electronic devices (such as smart phones) need to be authenticated under specified conditions before subsequent applications can be performed. In order to confirm whether the operator performing the network operation is the user who has completed the procedures, or to confirm that the user meets the specified conditions, the user usually needs to hold a specific certificate (such as a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3231H04L63/0861H04L9/32H04L9/40
Inventor 王纪清陈谋琰
Owner ORBIT TECH