Authentication in ubiquitous environments
一种认证用户、认证信息的技术,应用在数字数据认证、安全通信的公共密钥、用户身份/权限验证等方向,达到防止伪造、强化信息保护的效果
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. When marking reference signs, even if the same technical features appear in different drawings, the same reference signs are used as far as possible. At the same time, it should also be noted that throughout the specification, if it is believed that the specific description of related known technical features and functions may make the subject matter of the present invention unclear, the detailed description will be omitted.
[0041] In addition, terms such as first, second, A, B, (a), and (b) may be used in describing the constituent elements of the present invention. These terms are only used to distinguish the corresponding technical features from other technical features, not to limit their essence, order or sequence, etc. The expressions "comprising" or "having" described above, if there is no specific contrary record, mean that the constituent eleme...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


