An authentication method and its device, equipment and storage medium
An authentication method and a technology to be authenticated, applied in the fields of equipment and storage media, authentication methods and devices thereof, can solve problems such as the inability to effectively prevent illegal rubbing of the Internet, and achieve the effect of identifying, preventing, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the specific technical solutions of the invention will be further described in detail below in conjunction with the drawings in the embodiments of the present application. The following examples are used to illustrate the present application, but not to limit the scope of the present application.
[0034] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to which this application belongs. The terms used herein are only for the purpose of describing the embodiments of the present application, and are not intended to limit the present application.
[0035] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a diff...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


