Privacy-protecting identity information storage method and device and privacy-protecting identity authentication method and device
A technology for protecting privacy and identity information, which is applied in the field of identity authentication methods and devices for protecting privacy, and can solve problems such as malicious use of face information, user privacy and network security damage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The specification will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. The described embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.
[0043] It should be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings. In the case of no conflict, the embodiments in this specification and the features in the embodiments can be combined with each other. In addition, words such as "first" and "second" in this specification are only used to distinguish information and do no...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


