Remote authentication method, device, and equipment, and storage medium
An authorized device and remote technology, applied in the field of communication, can solve problems such as customer loss and high risk, and achieve the effect of improving security and avoiding leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0066] In the following description, many technical details are proposed in order to enable readers to better understand the application. However, those skilled in the art can understand that without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.
[0067] It can be understood that in the present invention, biometric features refer to biometric features that can uniquely identify a user, such as fingerprints, irises, facial features, voice, and the like.
[0068] In addition, it can be understood that in the present invention, a mobile terminal includes, but is not limited to, a smart phone, a tablet computer, and the like. Device ID (identification code) refers to the information that can uniquely identify the device to be authorized, such as the identification code or identification number set for the device to be authorized, or ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


