Authentication method and device
An authentication and authentication request technology, applied in the authentication field, can solve problems such as high back-end pressure and complex system implementation methods, and achieve the effect of simplified process, safe and convenient processing and rendering
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0074] The exemplary embodiments of the present invention will be described below, including various details of the embodiments of the invention to help understand, and they should be considered simply exemplary. Accordingly, it will be appreciated by those skilled in the art that various modifications and modifications can be made to the embodiments described herein without departing from the scope and spirit of the invention. Also, for the sake of clarity and concise, the following description is omitted in the following description.
[0075] In the authentication process mainly directed to the front and rear two portions. In order to simplify the development process that may be developed during a rear end of the front, front and rear ends are not mutually dependent, reduce the coupling of the front and rear ends, front and rear ends so that development can be carried out simultaneously, thus reducing development time and improve the efficiency of program development.
[0076] A...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


