Method and system for performing preferential generation of second factor authentication
A two-factor authentication and factor technology, applied in the field of implementing priority generation second-factor authentication and systems, can solve problems such as service loss, time-consuming, difficult retrieval and keying processes, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] Terms associated with this disclosure include:
[0032] The singular forms "a", "an" and "the" include plural forms unless expressly stated otherwise. Likewise, the term "comprising" (or "comprise") means "including (or including) but not limited to". The relative terms "long" and "short" are intended as relative measurements relative to each other, since the measurement of an item named "long" will be relatively longer than the measurement of the corresponding item named "short". Unless defined otherwise, all technical and scientific terms used in this document have the same meaning as commonly understood by one of ordinary skill in the art.
[0033] An "application" refers to a program configured to notify a client device to perform one or more tasks.
[0034]An "electronic device" or "computing device" refers to a device that includes a processor and memory. Each device may have its own processor and / or memory, or the processor and / or memory may be shared with oth...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


