Event authentication method and device

An authentication method and event technology, applied in the communication field, can solve problems such as data tampering, long authentication time, and network paralysis

Inactive Publication Date: 2017-06-13
BUBI BEIJING NETWORK TECH CO LTD
View PDF4 Cites 62 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the servers of third-party organizations are relatively concentrated, so they are vulnerable to network attacks and cause network paralysis
In addition, due to the limitations of their own capabilities, third-party organizations may have certification deviations, cumbersome certification procedures, and long certification times, and even third-party organizations may tamper with data without authorization.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Event authentication method and device
  • Event authentication method and device
  • Event authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other, and the contents in each embodiment can be referred to and quoted from each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0030] figure 1 is a schematic flowchart of an event authentication method according to an embodiment of the present invention.

[0031] Such as figure 1 As shown, the authentication method includes the following steps: S110, collect relevant information of the event to be authenticated; S120, gene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an event authentication method and device. The method includes: collecting the related information of a to-be-authenticated event; generating an authentication request for performing authentication on the to-be-authenticated event when the related information meets the triggering conditions of the to-be-authenticated event; responding to the generated request to retrieve historical records associated with the requested to-be-authenticated event from a block chain; authenticating the to-be-authenticated event according to the historical records. The method has the advantages that the collected event information is compared with preset event information to trigger the event authentication flow, and the problems that an existing authentication program is complex, long in authentication time, non-objective in authentication, and the like are solved; the authentication is performed on the basis of the historical records, which cannot be tampered and are high in reliability, in the block chain, and high authentication result reliability and high safety node are achieved.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to an event authentication method and device. Background technique [0002] With the rapid development of communication technology, tangible items and intangible event information will be abstracted into digital information. Digital information greatly facilitates the dissemination and processing of information, but whether the information is legal and complete has always troubled people. At present, people mainly authenticate event information through third-party organizations. However, the servers of third-party organizations are relatively concentrated, so they are vulnerable to network attacks and cause network paralysis. In addition, due to the limitations of their own capabilities, third-party organizations will have certification deviations, cumbersome certification procedures, long certification time, and even unauthorized tampering of data by third-party org...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45
CPCG06F21/45
Inventor 蒋海翟海滨李军黄海泉刘春伟
Owner BUBI BEIJING NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products