An identity authentication method, device and equipment
An identity authentication and equipment technology, which is applied in digital data authentication, neural learning methods, computer security devices, etc., can solve the problems of easy interception, inability to guarantee the accuracy of user identity authentication, and easy leakage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] In order to make the purpose, features, and advantages of the application more obvious and understandable, the technical solutions in the embodiments of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of this application.
[0029] In the era of mobile Internet, smart mobile terminals act as the material carrier connecting the real world and the mobile Internet world, and are used in all aspects of our lives, such as shopping, travel, etc. Therefore, the security of smart mobile terminals is becoming increasingly important. Passive defensive measures such as passwords, fingerprints, and ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


