Blockchain authentication via hard/soft token verification
A blockchain and credential technology, applied in the field of authorized access management, can solve problems such as complex deployment infrastructure
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] It will be readily understood that the instant components may be arranged and designed in a variety of different configurations, as generally described and illustrated in the figures herein. Accordingly, the following detailed description of embodiments of at least one of a method, apparatus, non-transitory computer-readable medium, and system, as shown in the accompanying figures, is not intended to limit the scope of the claimed application, but merely represents Selected embodiment.
[0018] The immediate features, structures, or characteristics described throughout this specification may be combined in any suitable manner in one or more embodiments. For example, use of the phrase "example embodiments," "some embodiments," or other similar language throughout this specification refers to the fact that a particular feature, structure, or characteristic described in connection with the embodiments can be included in at least one embodiment . Thus, appearances of the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



