User identification method and system
A technology for user identification and legitimate users, applied in the field of user identification methods and systems, to achieve the effects of flexible quantity and installation location, high security and reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
[0042] In order to illustrate the technical solutions described in this application, specific examples are used below to illustrate.
[0043] In order to facilitate the understanding of this application, here is a brief description of the embodiment of this application. Due to indoor video monitoring, on the one hand, for legal users, their daily work and life will also be photograph...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


