Security authentication method and system, equipment and medium
A security authentication and security technology, applied in the direction of digital data protection, etc., can solve the problems of the decline of real-time data processing and unusable functions, and achieve the effect of ensuring real-time performance and satisfying high-speed communication.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] In order to make the objects, technical solutions, and advantages of the present invention, the technical solutions in the embodiments of the present invention will be described in connection with the drawings of the present invention, and will be described in connection with the drawings of the present invention. Embodiments, not all of the embodiments. Based on the embodiments of the present invention, those of ordinary skill in the art will belong to the scope of the present invention without all other embodiments obtained without creative labor. Unless otherwise defined, the technical terms used herein or scientific terms should be understood by those who have general skills in the art of the present invention. Similar words to "including" as used herein refers to the elements or objects of the previous article or objects that exhibit appear later in the word and their equivalents without excluding other elements or objects.
[0028] With the digital terminal device in ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com