Biometric private key infrastructure
A biometric, private key technology, applied in the field of network communication and transactions, can solve security threats, tampering, theft and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027]The present invention will now be described in detail with reference to the accompanying drawings, which are provided as illustrative examples of the invention to enable those skilled in the art to practice the invention. Obviously, the following figures and examples are not meant to limit the scope of the present invention. In addition, some elements of the present invention can be realized partially or entirely using known components, and only those known component parts necessary for understanding the present invention will be described, and detailed descriptions of other parts of these known components will be omitted for the sake of highlight the invention. Furthermore, implementation using certain components in hardware versus other components in software is considered by those skilled in the art to be a design choice, and their combinations described here are by way of example, not limitation. Additionally, the invention includes equivalents to currently and futu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com