User verification method, user verification device, user verification system and storage medium
A user verification and user technology, which is applied in the field of information security, can solve problems such as poor security and inability to verify, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.
[0035] An aspect of an embodiment of the present disclosure provides a user verification method for an electronic device. The user verification method includes: obtaining the verification data generated by the user to be verified operating the screen of th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


