Authentication method and system
An authentication method and document technology, applied in the field of authentication and systems, can solve the problems of time-consuming data marking tasks and difficult detection of special patterns.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] Embodiments will be described, by way of example only, with reference to the accompanying drawings. The same reference numerals and symbols in the drawings indicate the same elements or equivalents.
[0016] Some portions of the following description are presented either explicitly or implicitly in terms of algorithms and functions or symbolic representations of operations on data within a computer memory. These algorithmic descriptions and functional or symbolic representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. Here, an algorithm is generally thought of as a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulation of physical quantities, such as electrical, magnetic or optical signals, capable of being stored, transferred, combined, compared and otherwise manipulated.
[0017] Unless expressly sta...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


