Near field information authentication method and device, electronic equipment and computer storage medium
A near-field, pending-authentication technology, applied in the field of information authentication, can solve the problems of poor practicability and convenience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] According to an embodiment of the present invention, an embodiment of a method for near-field information authentication is provided. It should be noted that the steps shown in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that herein.
[0041] figure 1 is a flowchart of a method for near-field information authentication according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0042] Step S102: Obtain the current location information of the object to be authenticated, and then determine the target grid area where the object to be authenticated is located, wherein, when the object to be authenticated is located within a preset range of its authorized merchant, the user terminal ...
Embodiment 2
[0156] An embodiment of the present invention further provides an apparatus for near-field information authentication, and the apparatus for near-field information authentication is mainly used to execute the near-field information authentication method provided by the above content of the embodiment of the present invention. The device for near-field information authentication is introduced in detail.
[0157] Figure 7 is a schematic diagram of a near-field information authentication device according to an embodiment of the present invention, such as Figure 7 As shown, the device for near-field information authentication mainly includes an acquisition module 10, a reception module 20, a determination module 30 and an information authentication module 40, wherein:
[0158] The obtaining module is used to obtain the current position information of the object to be authenticated, and then determine the target grid area where the object to be authenticated is located. Periodi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com