Skip to main content
. 2023 Sep 26;23(19):8090. doi: 10.3390/s23198090

Figure 2.

Figure 2

The user authentication process utilizes the existing mobile signature solution that is currently available for the operation.