Method for verifying right of passage
A right-of-way and background technology, applied in the direction of instruments, electrical digital data processing, digital data processing components, etc., can solve problems such as stealing passwords, cracking, and difficult to remember passwords
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] Embodiment 1 is a method for verifying the right of way with an image as the recognition background.
[0029] Please refer to FIG. 1, which is a step diagram of a method for verifying the right of way of the present invention, wherein the recognition background is an image, and the method includes the following steps:
[0030] Step 1: Inputting user identification is to use an input / output device, such as a keyboard, installed in a system for verifying the right of way;
[0031] Step 2: Judging whether it is an authorized user identification, if yes, then enter step 11, if not, then enter the next step, which is to compare with the user data in a storage device, which can be directly set A near-end (local) storage device in the system for verifying the right of way, or a remote (remote) storage device connected through the network;
[0032] Step 3: The user decides whether to create basic data, if yes, then enter the next step, if not, then enter step 18;
[0033] Ste...
Embodiment 2
[0048] Embodiment 2 is a method for verifying the right of way using a recognition background composed of a plurality of colored areas.
[0049] Please refer to FIG. 1, which is a step diagram of a method for verifying the right of way of the present invention, wherein the recognition background is composed of a plurality of colored areas, and the method includes the following steps:
[0050] Step 1: Inputting user identification is to use an input / output device, such as a keyboard, installed in a system for verifying the right of way;
[0051] Step 2: Judging whether it is an authorized user identification, if yes, then enter step 11, if not, then enter the next step, which is to compare with the user data in a storage device, which can be directly set A near-end (local) storage device in the system for verifying the right of way, or a remote (remote) storage device connected through the network;
[0052] Step 3: The user decides whether to create basic data, if yes, then en...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 